Login / Signup
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
Orr Dunkelman
Nathan Keller
Adi Shamir
Published in:
J. Cryptol. (2014)
Keyphrases
</>
cellular automata
power analysis
block cipher
neural network
real world
closely related
end to end
anomaly detection
intrusion detection
countermeasures
mobile communication