Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU
From MaRDI portal
Publication:2794508
DOI10.1007/978-3-319-28166-7_17zbMath1459.94129OpenAlexW2344376994MaRDI QIDQ2794508
Jiqiang Lu, Matt Henricksen, Zhen Li
Publication date: 10 March 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-28166-7_17
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A comparison of cryptanalytic tradeoff algorithms
- Instant ciphertext-only cryptanalysis of GSM encrypted communication
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- The cost of false alarms in Hellman and rainbow tradeoffs
- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
- Time-memory-processor trade-offs
- A cryptanalytic time-memory trade-off
- Another attack on A5/1
- Rigorous Time/Space Trade-offs for Inverting Functions
- Conditional Estimators: An Effective Attack on A5/1
- Improved Time-Memory Trade-Offs with Multiple Data
- Advances in Cryptology - CRYPTO 2003
- Selected Areas in Cryptography
- Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
This page was built for publication: Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU