Back to Results
First PageMeta Content
Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms


A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France
Add to Reading List

Document Date: 2010-12-02 17:52:59


Open Document

File Size: 250,72 KB

Share Result on Facebook

Company

AES / /

Country

China / /

IndustryTerm

integrity algorithm / mobile communications / encryption algorithm / cryptographic algorithms / /

Person

M T IK / IV / Thomas Fuhr / Victor Shoup / Hugo Krawczyk / Henri Gilbert / Marion Videau / Jean-René Reinhard / /

Technology

Encryption / 128-EIA3 MAC algorithm / a third integrity algorithm / http / MAC Algorithms / candidate EIA algorithm / MAC algorithm / two cryptographic algorithms / 5 Algorithm / 3G / encryption algorithm / third LTE encryption / integrity algorithm / 128-EIA3 Integrity Algorithm / pdf / 128-EIA3 algorithm / stream cipher / /

URL

http /

SocialTag