Cryptographic analysis of the Bluetooth secure connection protocol suite
From MaRDI portal
Publication:6157540
DOI10.1007/978-3-030-92075-3_24OpenAlexW3217191762MaRDI QIDQ6157540FDOQ6157540
Authors: Marc Fischlin, Olga Sanina
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92075-3_24
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer system organization (68Mxx)
Cites Work
- Title not available (Why is that?)
- Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
- Practical and tightly-secure digital signatures and authenticated key exchange
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
- Highly efficient key exchange protocols with optimal tightness
- On the security of TLS-DHE in the standard model
- PRF-ODH: relations, instantiations, and impossibility results
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
Cited In (1)
This page was built for publication: Cryptographic analysis of the Bluetooth secure connection protocol suite
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157540)