Revisit two memoryless state-recovery cryptanalysis methods on A5/1
From MaRDI portal
Publication:2151299
DOI10.1007/978-3-030-88323-2_10zbMath1492.94169OpenAlexW3207341509MaRDI QIDQ2151299
Publication date: 1 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88323-2_10
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptanalysis of GSM encryption in 2G/3G networks without rainbow tables
- Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU
- Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling
- Conditional Estimators: An Effective Attack on A5/1
- Selected Areas in Cryptography
This page was built for publication: Revisit two memoryless state-recovery cryptanalysis methods on A5/1