Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
From MaRDI portal
(Redirected from Publication:778923)
Recommendations
- Information Security and Cryptology
- Validation of Elliptic Curve Public Keys
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
Cited in
(5)- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- Cryptographic analysis of the Bluetooth secure connection protocol suite
- Computer Aided Verification
- Information Security and Cryptology
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
This page was built for publication: Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778923)