An algebraic attack to the Bluetooth stream cipher \textsc{E0}
From MaRDI portal
Publication:2081340
DOI10.1016/j.ffa.2022.102102zbMath1500.94035arXiv2201.01262OpenAlexW4292701992WikidataQ121887757 ScholiaQ121887757MaRDI QIDQ2081340
Sharwan K. Tiwari, Sergio Polese, Roberto La Scala, Andrea Visconti
Publication date: 12 October 2022
Published in: Finite Fields and their Applications (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2201.01262
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10) Difference algebra (12H10)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Boolean functions and their applications in cryptography
- Noetherian quotients of the algebra of partial difference polynomials and Gröbner bases of symmetric ideals
- Stream/block ciphers, difference equations and algebraic attacks
- Efficient computation of zero-dimensional Gröbner bases by change of ordering
- Polynomial automorphisms and the Jacobian conjecture
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Hybrid approach for solving multivariate systems over finite fields
- Attacking Bivium Using SAT Solvers
- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
- Algebraic Cryptanalysis
- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
- Algebraic Attacks on Stream Ciphers with Gröbner Bases
- Stream Ciphers
- SINGULAR
- A note on Nullstellensatz over finite fields
- Advances in Cryptology - CRYPTO 2003
- Algebraic Cryptanalysis of the Data Encryption Standard
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- Gröbner bases and gradings for partial difference ideals