Faster Correlation Attack on Bluetooth Keystream Generator E0.
Yi LuSerge VaudenayPublished in: CRYPTO (2004)
Keyphrases
- pseudorandom
- cellular automata
- secret key
- mobile phone
- short range
- alert correlation
- wifi
- encryption algorithm
- long range
- uniformly distributed
- ubiquitous computing
- countermeasures
- intrusion detection
- low cost
- high correlation
- power law
- cellular phone
- malicious users
- memory efficient
- correlation analysis
- neural network
- end to end
- mobile devices
- data mining