Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack

From MaRDI portal
Publication:778923
Jump to:navigation, search

DOI10.1007/978-3-030-38471-5_11zbMATH Open1453.94060OpenAlexW2928007274MaRDI QIDQ778923FDOQ778923


Authors: Eli Biham, Lior Neumann Edit this on Wikidata


Publication date: 21 July 2020


Full work available at URL: https://doi.org/10.1007/978-3-030-38471-5_11




Recommendations

  • Information Security and Cryptology
  • Validation of Elliptic Curve Public Keys
  • Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
  • Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
  • Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract)


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (5)

  • Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
  • Information Security and Cryptology
  • A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
  • Cryptographic analysis of the Bluetooth secure connection protocol suite
  • Computer Aided Verification





This page was built for publication: Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778923)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:778923&oldid=12712294"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 30 January 2024, at 11:04. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki