-
1
-
-
77954726427
-
-
MZA Telecoms & IT Analysts: Press Release August
-
MZA Telecoms & IT Analysts: Global cordless phone market. Press Release (August 2009)
-
(2009)
Global Cordless Phone Market
-
-
-
3
-
-
67650099368
-
Attacks on the DECT authentication mechanisms
-
Fischlin, M. (ed.) RSA Conference 2009. Springer, Heidelberg
-
Lucks, S., Schuler, A., Tews, E., Weinmann, R.P., Wenzel, M.: Attacks on the DECT authentication mechanisms. In: Fischlin, M. (ed.) RSA Conference 2009. LNCS, vol. 5473, pp. 48-65. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5473
, pp. 48-65
-
-
Lucks, S.1
Schuler, A.2
Tews, E.3
Weinmann, R.P.4
Wenzel, M.5
-
5
-
-
35048875265
-
An improved correlation attack on A5/1
-
Handschuh, H., Hasan, M.A. (eds.) SAC 2004. Springer, Heidelberg
-
Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5/1. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 1-18. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3357
, pp. 1-18
-
-
Maximov, A.1
Johansson, T.2
Babbage, S.3
-
6
-
-
33745587007
-
Conditional estimators: An effective attack on A5/1
-
Preneel, B., Tavares, S. (eds.) SAC 2005. Springer, Heidelberg
-
Barkan, E., Biham, E.: Conditional estimators: An effective attack on A5/1. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 1-19. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3897
, pp. 1-19
-
-
Barkan, E.1
Biham, E.2
-
7
-
-
77954709038
-
Data ciphering device
-
Alcatel: U.S. Patent 5,608,802
-
Alcatel: Data ciphering device. U.S. Patent 5,608,802 (1994)
-
(1994)
-
-
-
8
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
van Oorschot, P.C. (ed.)
-
Nohl, K., Evans, D., Starbug, Plötz, H.: Reverse-engineering a cryptographic RFID tag. In: van Oorschot, P.C. (ed.) USENIX Security Symposium 2008, USENIX Association, pp. 185-194 (2008)
-
(2008)
USENIX Security Symposium 2008, USENIX Association
, pp. 185-194
-
-
Nohl, K.1
Evans, D.2
Starbug3
Plötz, H.4
-
9
-
-
43449099742
-
Instant ciphertext-only cryptanalysis of GSM encrypted communication
-
DOI 10.1007/s00145-007-9001-y
-
Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. Journal of Cryptology 21(3), 392-429 (2008) (Pubitemid 351667022)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.3
, pp. 392-429
-
-
Barkan, E.1
Biham, E.2
Keller, N.3
-
10
-
-
84974707207
-
Real time cryptanalysis of A5/1 on a PC
-
Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
-
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
11
-
-
56649114656
-
Differential cryptanalysis in stream ciphers
-
Report 2007/218
-
Biham, E., Dunkelman, O.: Differential cryptanalysis in stream ciphers. Cryptology ePrint Archive, Report 2007/218 (2007), http://eprint.iacr.org/2007/ 218
-
(2007)
Cryptology ePrint Archive
-
-
Biham, E.1
Dunkelman, O.2
|