Back to Results
First PageMeta Content
MISTY1 / Boomerang attack / Key schedule / Feistel cipher / ICE / Differential cryptanalysis / E0 / A5/1 / Block cipher / Cryptography / KASUMI / Stream ciphers


A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science
Add to Reading List

Document Date: 2010-01-10 13:51:33


Open Document

File Size: 242,53 KB

Share Result on Facebook

Currency

pence / /

/

Facility

Computer Science Weizmann Institute of Science P.O. Box / /

IndustryTerm

cellular telephony / attack algorithm / exhaustive search / generation networks / telephony / /

OperatingSystem

L3 / /

Organization

Mathematics and Computer Science Weizmann Institute / Adi Shamir Faculty of Mathematics / GSM Association / Weizmann Institute of Science / /

Person

Karsten Nohl / Ya Xb Xc / Nathan Keller / /

Technology

encryption / block cipher / cryptography / attack algorithm / GSM / secret key / A5/3 algorithm / /

SocialTag