Login / Signup
Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract).
Jiqiang Lu
Zhen Li
Matt Henricksen
Published in:
ACNS (2015)
Keyphrases
</>
extended abstract
stream cipher
secret key
trade off
scheme for wireless sensor networks
ciphertext
smart card
pseudorandom
authentication scheme
rfid tags
public key
key management
hash functions
security analysis
mobile robot
encryption scheme
standard model
encryption algorithm
wireless sensor networks
real time