A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3.
Thomas FuhrHenri GilbertJean-René ReinhardMarion VideauPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- detection algorithm
- learning algorithm
- times faster
- high accuracy
- experimental evaluation
- similarity measure
- improved algorithm
- particle swarm optimization
- digital images
- dynamic programming
- theoretical analysis
- segmentation algorithm
- optimization algorithm
- cost function
- matching algorithm
- optimal solution
- probabilistic model
- quality of service
- significant improvement
- smart card
- countermeasures