Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
From MaRDI portal
Publication:5465833
DOI10.1007/978-3-540-30539-2_34zbMATH Open1094.94516OpenAlexW2179628750MaRDI QIDQ5465833FDOQ5465833
Authors: Yi Lu, Serge Vaudenay
Publication date: 12 August 2005
Published in: Advances in Cryptology - ASIACRYPT 2004 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-30539-2_34
Recommendations
- Advances in Cryptology – CRYPTO 2004
- Practical cryptanalysis of Bluetooth encryption with condition masking
- Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
- An algebraic attack to the Bluetooth stream cipher \textsc{E0}
- scientific article; zbMATH DE number 2085193
Cited In (14)
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- Information Security and Cryptology
- Advances in Cryptology – CRYPTO 2004
- Practical cryptanalysis of Bluetooth encryption with condition masking
- Cryptanalysis of an E0-like combiner with memory
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Bias analysis of a certain problem with applications to E0 and Shannon cipher
- Improved multi-pass fast correlation attacks with applications
- On Large Distributions for Linear Cryptanalysis
- Two Trivial Attacks on Trivium
- Integrality authentication scheme of bluetooth baseband packet header based on key stream
This page was built for publication: Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5465833)