scientific article; zbMATH DE number 2086710
From MaRDI portal
Publication:4737248
zbMath1055.94017MaRDI QIDQ4737248
Vittorio Bagini, Guglielmo Morgari, Jovan Dj. Golić
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320238.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Iterative numerical methods for linear systems (65F10)
Related Items
Fast Correlation Attacks: Methods and Countermeasures ⋮ Practical cryptanalysis of Bluetooth encryption with condition masking ⋮ Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks ⋮ Cryptanalysis of an E0-like combiner with memory ⋮ Unnamed Item ⋮ An algebraic attack to the Bluetooth stream cipher \textsc{E0}