-
1
-
-
84857740683
-
-
3GPP Document 1 128-EEA3 and 128-EIA3 specification, Ts, 3rd Generation Partnership Project (3GPP)
-
3GPP (2010a) Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 1 128-EEA3 and 128-EIA3 specification, Ts, 3rd Generation Partnership Project (3GPP). Available online at: http://www.gsmworld.com/our-work/programmes-andinitiatives/fraud-and- security/gsm-security-algorithms.htm
-
(2010)
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
-
-
-
2
-
-
84857740683
-
-
3GPP Document 2 ZUC specification, Ts, 3rd Generation Partnership Project (3GPP)
-
3GPP (2010b) Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 2 ZUC specification, Ts, 3rd Generation Partnership Project (3GPP). Available online at: http://www.gsmworld. com/ourwork/programmes-and-initiatives/fraud-and-security/gsm-security- algorithms.htm
-
(2010)
Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
-
-
-
3
-
-
79955919703
-
On hardware-oriented message authentication with applications towards RFID
-
14-15 March, IEEE Computer Society Conference Publishing Services, Istanbul
-
Ågren, M., Hell, M. and Johansson, T. (2011) 'On hardware-oriented message authentication with applications towards RFID', Proceedings of the 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, 14-15 March, IEEE Computer Society Conference Publishing Services, Istanbul, pp.26-33.
-
(2011)
Proceedings of the 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications
, pp. 26-33
-
-
Ågren, M.1
Hell, M.2
Johansson, T.3
-
4
-
-
79959970890
-
Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128
-
9-10 September, Lausanne, Switzerland
-
Aumasson, J-P., Dinur, I., Henzen, L., Meier, W. and Shamir, A. (2009) 'Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128', Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'09), 9-10 September, Lausanne, Switzerland.
-
(2009)
Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'09)
-
-
Aumasson, J.-P.1
Dinur, I.2
Henzen, L.3
Meier, W.4
Shamir, A.5
-
5
-
-
48249111366
-
The MICKEY stream ciphers
-
Robshaw, M. and Billet, O. (Eds) Springer-Verlag
-
Babbage, S. and Dodd, M. (2008) 'The MICKEY stream ciphers', in Robshaw, M. and Billet, O. (Eds): New Stream Cipher Designs, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4986, pp.191-209.
-
(2008)
New Stream Cipher Designs, Lecture Notes in Computer Science
, vol.4986
, pp. 191-209
-
-
Babbage, S.1
Dodd, M.2
-
6
-
-
70350663169
-
Algebraic and correlation attacks against linearly filtered non linear feedback shift registers
-
Avanzi, R., Keliher, L. and Sica, F. (Eds) Springer-Verlag
-
Berbain, C., Gilbert, H. and Joux, A. (2008) 'Algebraic and correlation attacks against linearly filtered non linear feedback shift registers', in Avanzi, R., Keliher, L. and Sica, F. (Eds): Selected Areas in Cryptography - SAC 2008, Lecture Notes in Computer Science, Springer-Verlag, Vol. 5381, pp.184-198.
-
(2008)
Selected Areas in Cryptography - SAC 2008, Lecture Notes in Computer Science
, vol.5381
, pp. 184-198
-
-
Berbain, C.1
Gilbert, H.2
Joux, A.3
-
7
-
-
33746740431
-
Cryptanalysis of grain
-
Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers
-
Berbain, C., Gilbert, H. and Maximov, A. (2006) 'Cryptanalysis of Grain', in Robshaw, M. (Ed.): Fast Software Encryption 2006, Lecture Notes in Computer Science, Vol. 4047, Springer-Verlag, pp.15-29. (Pubitemid 44165568)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4047
, pp. 15-29
-
-
Berbain, C.1
Gilbert, H.2
Maximov, A.3
-
8
-
-
84937419430
-
Cryptanalytic time/memory/data tradeoffs for stream ciphers
-
Okamoto, T. (Ed.) Springer-Verlag
-
Biryukov, A. and Shamir, A. (2000) 'Cryptanalytic time/memory/data tradeoffs for stream ciphers', in Okamoto, T. (Ed.): Advances in Cryptology - ASIACRYPT 2000, Lecture Notes in Computer Science, Vol. 1976, Springer-Verlag, pp.1-13.
-
(2000)
Advances in Cryptology - ASIACRYPT 2000, Lecture Notes in Computer Science
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
9
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
Preneel, B. (Ed.) Springer-Verlag
-
Canteaut, A. and Trabbia, M. (2000) 'Improved fast correlation attacks using parity-check equations of weight 4 and 5, in Preneel, B. (Ed.): Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag, pp.573-588.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
10
-
-
84969367308
-
A simple algorithm for fast correlation attacks on stream ciphers
-
Schneier, B. (Ed.) Springer-Verlag
-
Chepyzhov, V., Johansson, T. and Smeets, B. (2000) 'A simple algorithm for fast correlation attacks on stream ciphers, in Schneier, B. (Ed.): Fast Software Encryption 2000, Lecture Notes in Computer Science, Vol. 1978, Springer-Verlag, pp.181-195.
-
(2000)
Fast Software Encryption 2000, Lecture Notes in Computer Science
, vol.1978
, pp. 181-195
-
-
Chepyzhov, V.1
Johansson, T.2
Smeets, B.3
-
11
-
-
84888039254
-
Fast correlation attacks: An algorithmic point of view
-
Chose, P., Joux, A. and Mitton, M. (2002) 'Fast correlation attacks: an algorithmic point of view', Lecture Notes in Computer Science, Vol. 2332, pp.209-221.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 209-221
-
-
Chose, P.1
Joux, A.2
Mitton, M.3
-
12
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback
-
Biham, E. (Ed.) Springer-Verlag
-
Courtois, N. and Meier, W. (2003) 'Algebraic attacks on stream ciphers with linear feedback', in Biham, E. (Ed.): Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, Vol. 2656, Springer-Verlag, pp.345-359.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science
, vol.2656
, pp. 345-359
-
-
Courtois, N.1
Meier, W.2
-
13
-
-
45449087908
-
Analysis of Grain's initialization algorithm
-
Vaudenay, S. (Ed.) Springer-Verlag
-
De Cannière, C., Kiiciik, O. and Preneel, B. (2008) 'Analysis of Grain's initialization algorithm, in Vaudenay, S. (Ed.): Progress in Cryptology - AFRICACRYPT 2008, Lecture Notes in Computer Science, Springer-Verlag, Vol. 5023, pp.276-289.
-
(2008)
Progress in Cryptology - AFRICACRYPT 2008, Lecture Notes in Computer Science
, vol.5023
, pp. 276-289
-
-
De Cannière, C.1
Kiiciik, O.2
Preneel, B.3
-
14
-
-
48249107069
-
Trivium
-
Robshaw, M. and Billet, O. (Eds) Springer-Verlag
-
De Cannière, C. and Preneel, B. (2008) 'Trivium', in Robshaw, M. and Billet, O. (Eds): New Stream Cipher Designs, Lecture Notes in Computer Science, Vol. 4986, Springer-Verlag, pp.244-266.
-
(2008)
New Stream Cipher Designs, Lecture Notes in Computer Science
, vol.4986
, pp. 244-266
-
-
De Cannière, C.1
Preneel, B.2
-
15
-
-
84857144423
-
An experimentally verified attack on full grain-128 using dedicated reconfigurable hardware
-
Dinur, I., Güneysu, T., Paar, C., Shamir, A. and Zimmermann, R. (2011) An Experimentally Verified Attack on Full Grain-128 using Dedicated Reconfigurable Hardware, Cryptology ePrint Archive, Report 2011/282. Available online at: http://eprint.iacr.org/2011/282
-
(2011)
Cryptology EPrint Archive, Report 2011/282
-
-
Dinur, I.1
Güneysu, T.2
Paar, C.3
Shamir, A.4
Zimmermann, R.5
-
16
-
-
79959996376
-
Breaking grain-128 with dynamic cube attacks
-
Joux, A. (Ed.) Springer-Verlag
-
Dinur, I. and Shamir, A. (2011) Breaking Grain-128 with dynamic cube attacks, in Joux, A. (Ed.): Fast Software Encryption 2011, Lecture Notes in Computer Science, Springer-Verlag, pp.167-187.
-
(2011)
Fast Software Encryption 2011, Lecture Notes in Computer Science
, pp. 167-187
-
-
Dinur, I.1
Shamir, A.2
-
17
-
-
84857158722
-
-
Workshop Record, SASC 2007, Bochum, Germany
-
Fischer, W., Gammel, B.M., Kniffler, O. and Velten, J. (2007) Differential Power Analysis of Stream Ciphers: The State of the Art of Stream Ciphers, Workshop Record, SASC 2007, Bochum, Germany.
-
(2007)
Differential Power Analysis of Stream Ciphers: The State of the Art of Stream Ciphers
-
-
Fischer, W.1
Gammel, B.M.2
Kniffler, O.3
Velten, J.4
-
18
-
-
84857145189
-
A forgery attack on the candidate LTE integrity algorithm 128-EIA3 (Updated version)
-
Fuhr, T., Gilbert, H., Reinhard, J-R. and Videau, M. (2010) A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (Updated Version), Cryptology ePrint Archive, Report 2010/618. Available online at: http://eprint.iacr.org/
-
(2010)
Cryptology EPrint Archive, Report 2010/618
-
-
Fuhr, T.1
Gilbert, H.2
Reinhard, J.-R.3
Videau, M.4
-
19
-
-
84857758778
-
Analysis of the initial and modified versions of the candidate 3GPP integrity algorithm 128-EIA3
-
Springer-Verlag
-
Fuhr, T., Gilbert, H., Reinhard, J-R. and Videau, M. (2011) 'Analysis of the initial and modified versions of the candidate 3GPP integrity algorithm 128-EIA3', Selected Areas in Cryptography - SAC 2011, Lecture Notes in Computer Science, Springer-Verlag.
-
(2011)
Selected Areas in Cryptography - SAC 2011, Lecture Notes in Computer Science
-
-
Fuhr, T.1
Gilbert, H.2
Reinhard, J.-R.3
Videau, M.4
-
20
-
-
84955594784
-
Intrinsic statistical weakness of keystream generators
-
Pieprzyk, J. and Safavi-Naini, R. (Eds) Springer-Verlag
-
Golić, J. (1994) 'Intrinsic statistical weakness of keystream generators', in Pieprzyk, J. and Safavi-Naini, R. (Eds): Advances in Cryptology - ASIACRYPT'94, Lecture Notes in Computer Science, Vol. 917, Springer-Verlag, pp.91-103.
-
(1994)
Advances in Cryptology - ASIACRYPT'94, Lecture Notes in Computer Science
, vol.917
, pp. 91-103
-
-
Golić, J.1
-
21
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
Golić, J.D. (1996) 'Computation of low-weight parity-check polynomials', Electronic Letters, Vol. 32, No. 21, pp.1981-1982. (Pubitemid 126606046)
-
(1996)
Electronics Letters
, vol.32
, Issue.21
, pp. 1981-1982
-
-
Golic, J.Dj.1
-
22
-
-
51849140875
-
Key-recovery attacks on universal hash function based MAC algorithms
-
Wagner, D. (Ed.) Springer-Verlag
-
Handschuh, H. and Preneel, B. (2008) 'Key-recovery attacks on universal hash function based MAC algorithms', Wagner, D. (Ed.): Advances in Cryptology - CRYPTO 2008, Lecture Notes in Computer Science, Vol. 5157, Springer-Verlag, pp.144-161.
-
(2008)
Advances in Cryptology - CRYPTO 2008, Lecture Notes in Computer Science
, vol.5157
, pp. 144-161
-
-
Handschuh, H.1
Preneel, B.2
-
23
-
-
39049129315
-
A stream cipher proposal: Grain-128
-
9-14 July 2006, Seattle, WA
-
Hell, M., Johansson, T., Maximov, A. and Meier, W. (2006a) 'A stream cipher proposal: Grain-128', IEEE International Symposium on Information Theory - ISIT 2006, 9-14 July 2006, Seattle, WA.
-
(2006)
IEEE International Symposium on Information Theory - ISIT 2006
-
-
Hell, M.1
Johansson, T.2
Maximov, A.3
Meier, W.4
-
24
-
-
84886703527
-
Grain - A stream cipher for constrained environments
-
Hell, M., Johansson, T. and Meier, W. (2006b) 'Grain - a stream cipher for constrained environments', International Journal of Wireless and Mobile Computing, Special Issue on Security of Computer Network and Mobile Systems, Vol. 2, No. 1, pp.86-93.
-
(2006)
International Journal of Wireless and Mobile Computing, Special Issue on Security of Computer Network and Mobile Systems
, vol.2
, Issue.1
, pp. 86-93
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
25
-
-
35048850492
-
Fault analysis of stream ciphers
-
Springer-Verlag
-
Hoch, J. and Shamir, A. (2004) 'Fault analysis of stream ciphers', CHES 2004, Lecture Notes in Computer Science, Vol. 3156, Springer-Verlag, pp.240-253.
-
(2004)
CHES 2004, Lecture Notes in Computer Science
, vol.3156
, pp. 240-253
-
-
Hoch, J.1
Shamir, A.2
-
26
-
-
84957062097
-
Fast correlation attacks based on turbo code techniques
-
Wiener, M. (Ed.) Springer-Verlag
-
Johansson, T. and Jönsson, F. (1999) 'Fast correlation attacks based on turbo code techniques', in Wiener, M. (Ed.): Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science, Vol. 1666, Springer-Verlag, pp.181-197.
-
(1999)
Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science
, vol.1666
, pp. 181-197
-
-
Johansson, T.1
Jönsson, F.2
-
27
-
-
84974625340
-
Fast correlation attacks through reconstruction of linear polynomials
-
Bellare, M. (Ed.) Springer-Verlag
-
Johansson, T. and Jönsson, F. (2000) 'Fast correlation attacks through reconstruction of linear polynomials', in Bellare, M. (Ed.): Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, Vol. 1880, Springer-Verlag, pp.300-315.
-
(2000)
Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science
, vol.1880
, pp. 300-315
-
-
Johansson, T.1
Jönsson, F.2
-
28
-
-
84957367286
-
New hash functions for message authentication
-
Springer-Verlag
-
Krawczyk, H. (1995) 'New hash functions for message authentication', Advances in Cryptology - EUROCRYPT'95, Springer-Verlag, pp.301-310.
-
(1995)
Advances in Cryptology - EUROCRYPT'95
, pp. 301-310
-
-
Krawczyk, H.1
-
29
-
-
70349884792
-
Slide resynchronization attack on the initialization of grain 1.0
-
Küçük, Ö. (2006) Slide Resynchronization Attack on the Initialization of Grain 1.0, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/044. Available online at: http://www.ecrypt.eu.org/stream
-
(2006)
ESTREAM, ECRYPT Stream Cipher Project, Report 2006/044
-
-
Küçük, O.1
-
30
-
-
70349858082
-
Related-key chosen IV attacks on grain-v1 and grain-128
-
Mu, Y., Susilo, W. and Seberry, J. (Eds) ACISP 2008, Lecture Notes in Computer Science Springer-Verlag
-
Lee, Y., Jeong, K., Sung, J. and Hong, S. (2008) 'Related-key chosen IV attacks on Grain-v1 and Grain-128, in Mu, Y., Susilo, W. and Seberry, J. (Eds): 13th Australasian Conference on Information Security and Privacy, ACISP 2008, Lecture Notes in Computer Science, Vol. 5107, Springer-Verlag, pp.321-335.
-
(2008)
13th Australasian Conference on Information Security and Privacy
, vol.5107
, pp. 321-335
-
-
Lee, Y.1
Jeong, K.2
Sung, J.3
Hong, S.4
-
31
-
-
34247336490
-
Cryptanalysis of the "grain" family of stream ciphers
-
DOI 10.1145/1128817.1128859, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
Maximov, A. (2006) Cryptanalysis of the 'Grain' family of stream ciphers', ACM Symposium on Information, Computer and Communications Security (ASI-ACCS'06), pp.283-288. (Pubitemid 46644745)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 283-288
-
-
Maximov, A.1
-
32
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
Meier, W. and Staffelbach, O. (1989) 'Fast correlation attacks on certain stream ciphers', Journal of Cryptology, Vol. 1, No. 3, pp.159-176.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
33
-
-
84958981368
-
Fast correlation attack algorithm with list decoding and an application
-
Mihaljević, M.J., Fossorier, M. and Imai, H. (2002) 'Fast correlation attack algorithm with list decoding and an application', Lecture Notes in Computer Science, Vol. 2355, pp.196-210.
-
(2002)
Lecture Notes in Computer Science
, vol.2355
, pp. 196-210
-
-
Mihaljević, M.J.1
Fossorier, M.2
Imai, H.3
-
34
-
-
84947926195
-
Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers
-
Cryptography and Coding
-
Penzhorn, W. and Kühn, G. (1995) 'Computation of low-weight parity checks for correlation attacks on stream ciphers', in Boyd, C. (Ed.): Cryptography and Coding-5th IMA Conference, Lecture Notes in Computer Science, Vol. 1025, Springer-Verlag, pp.74-83. (Pubitemid 126019848)
-
(1995)
Lecture Notes in Computer Science
, Issue.1025
, pp. 74-83
-
-
Penzhorn, W.T.1
Kuehn, G.J.2
-
35
-
-
78651077262
-
Greedy distinguishers and nonrandomness detectors
-
Gong, G. and Gupta, K.C. (Eds) Springer-Verlag
-
Stankovski, P. (2010) 'Greedy distinguishers and nonrandomness detectors', in Gong, G. and Gupta, K.C. (Eds): Progress in Cryptology - INDOCRYPT 2010, Lecture Notes in Computer Science, Vol. 6498, Springer-Verlag, pp.210-226.
-
(2010)
Progress in Cryptology - INDOCRYPT 2010, Lecture Notes in Computer Science
, vol.6498
, pp. 210-226
-
-
Stankovski, P.1
-
36
-
-
84937428040
-
A generalized birthday problem
-
Yung, M. (Ed.) Springer-Verlag
-
Wagner, D. (2002) 'A generalized birthday problem', in Yung, M. (Ed.): Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science, Vol. 2442, Springer-Verlag, pp.288-303.
-
(2002)
Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
|