Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
From MaRDI portal
Publication:5465833
Recommendations
- Advances in Cryptology – CRYPTO 2004
- Practical cryptanalysis of Bluetooth encryption with condition masking
- Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
- An algebraic attack to the Bluetooth stream cipher \textsc{E0}
- scientific article; zbMATH DE number 2085193
Cited in
(17)- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- On Large Distributions for Linear Cryptanalysis
- Cryptanalysis of an E0-like combiner with memory
- Integrality authentication scheme of bluetooth baseband packet header based on key stream
- Bias analysis of a certain problem with applications to E0 and Shannon cipher
- Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
- Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
- An algebraic attack to the Bluetooth stream cipher \textsc{E0}
- Improved multi-pass fast correlation attacks with applications
- Two Trivial Attacks on Trivium
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Advances in Cryptology – CRYPTO 2004
- scientific article; zbMATH DE number 2048526 (Why is no real title available?)
- scientific article; zbMATH DE number 2085193 (Why is no real title available?)
- scientific article; zbMATH DE number 2086710 (Why is no real title available?)
- Information Security and Cryptology
- Practical cryptanalysis of Bluetooth encryption with condition masking
This page was built for publication: Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5465833)