A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
暂无分享,去创建一个
[1] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[2] Thomas Johansson,et al. Another attack on A5/1 , 2003, IEEE Trans. Inf. Theory.
[3] Alex Biryukov,et al. Cryptanalysis of SAFER++ , 2003, CRYPTO.
[4] Jongsung Kim,et al. Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192 , 2005, FSE.
[5] Eli Biham,et al. A Related-Key Rectangle Attack on the Full KASUMI , 2005, ASIACRYPT.
[6] Eli Biham,et al. Conditional Estimators: An Effective Attack on A5/1 , 2005, Selected Areas in Cryptography.
[7] Eli Biham,et al. New Results on Boomerang and Rectangle Attack , 2002, IACR Cryptol. ePrint Arch..
[8] Alex Biryukov,et al. The Boomerang Attack on 5 and 6-Round Reduced AES , 2004, AES Conference.
[9] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[10] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[11] Jongsung Kim,et al. The Related-Key Rectangle Attack - Application to SHACAL-1 , 2004, ACISP.
[12] Eli Biham,et al. New types of cryptanalytic attacks using related keys , 1994, Journal of Cryptology.
[13] Bruce Schneier,et al. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES , 1996, CRYPTO.
[14] Eli Biham,et al. Related-Key Boomerang and Rectangle Attacks , 2005, EUROCRYPT.
[15] Orr Dunkelman,et al. An Improved Impossible Differential Attack on MISTY1 , 2008, ASIACRYPT.