Back to Results
First PageMeta Content
Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation


The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca
Add to Reading List

Document Date: 2012-12-11 11:12:53


Open Document

File Size: 352,45 KB

Share Result on Facebook

Company

GMAC / AES / CBC / EIA Wireless / /

/

Facility

Computer Engineering University of Waterloo Waterloo / /

IndustryTerm

cellular communications / wireless channels / wireless communication network / integrity protection algorithms / wireless environment / wireless communication systems / linear forgery attack algorithm / /

Organization

Electrical and Computer Engineering University of Waterloo Waterloo / M AC / LTE Teng Wu and Guang Gong Department of Electrical / /

Person

Guang Gong / /

Technology

encryption / cryptography / integrity protection algorithms / linear forgery attack algorithm / public key / Extensible Authentication Protocol / certain MAC-generating algorithms / two integrity protection algorithms / block cipher / MAC-generating algorithms / MAC-generating algorithm / secure MAC-generating algorithm / 3G / MAC generating algorithm / stream cipher / mobile devices / /

SocialTag