Practical cryptanalysis of Bluetooth encryption with condition masking
From MaRDI portal
Publication:1753167
DOI10.1007/s00145-017-9260-1zbMath1444.94113OpenAlexW4240039531WikidataQ122889495 ScholiaQ122889495MaRDI QIDQ1753167
Chao Xu, Dengguo Feng, Bin Zhang
Publication date: 28 May 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9260-1
Cites Work
- Walsh transforms and cryptographic applications in bias computing
- Cryptanalysis of an E0-like combiner with memory
- Fast correlation attacks on certain stream ciphers
- Correlation properties of combiners with memory in stream ciphers
- Correlation properties of a general binary combiner with memory
- Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Multi-pass Fast Correlation Attack on Stream Ciphers
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- How Far Can We Go Beyond Linear Cryptanalysis?
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Practical cryptanalysis of Bluetooth encryption with condition masking