Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
From MaRDI portal
Publication:778923
DOI10.1007/978-3-030-38471-5_11zbMATH Open1453.94060OpenAlexW2928007274MaRDI QIDQ778923FDOQ778923
Authors: Eli Biham, Lior Neumann
Publication date: 21 July 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-38471-5_11
Recommendations
- Information Security and Cryptology
- Validation of Elliptic Curve Public Keys
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)
Cited In (5)
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- Information Security and Cryptology
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- Cryptographic analysis of the Bluetooth secure connection protocol suite
- Computer Aided Verification
This page was built for publication: Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778923)