An algebraic attack to the Bluetooth stream cipher E0.
Roberto La ScalaSergio PoleseSharwan K. TiwariAndrea ViscontiPublished in: Finite Fields Their Appl. (2022)
Keyphrases
- stream cipher
- secret key
- ciphertext
- smart card
- scheme for wireless sensor networks
- mobile phone
- pseudorandom
- authentication scheme
- public key
- wifi
- key management
- ubiquitous computing
- authentication protocol
- encryption scheme
- key distribution
- standard model
- data sets
- hash functions
- nearest neighbor
- high security
- similarity measure
- information systems