Author:
Wang Mingxing,Hao Yonglin
Publisher
Springer International Publishing
Reference14 articles.
1. Golic, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239–255. Springer, Heidelberg (1997). https://doi.org/10.1007/3-540-69053-0_17
2. Biham, E., Dunkelman, O.: Cryptanalysis of the A5/1 GSM stream cipher. In: Roy, B.K., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS. vol. 1977, pp. 43–51. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44495-5_5
3. Shah, J., Mahalanobis, A.: A new guess-and-determine attack on the A5/1 stream cipher. Cryptology ePrint Archive, Report 2012/208 (2012). http://eprint.iacr.org/2012/208
4. Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5/1. In: Handschuh, H., Hasan, A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 1–18. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30564-4_1
5. Li, Z.: Optimization of rainbow tables for practically cracking GSM A5/1 based on validated success rate modeling. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 359–377. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-319-29485-8_21