Author:
Biryukov Alex,Shamir Adi,Wagner David
Publisher
Springer Berlin Heidelberg
Reference5 articles.
1. R. Anderson, M. Roe, A5, http://jya.com/crack-a5.htm , 1994.
2. S. Babbage, A Space/Time Tradeoff in Exhaustive Search Attacks on Stream Ciphers, European Convention on Security and Detection, IEE Conference publication, No. 408, May 1995.
3. M. Briceno, I. Goldberg, D. Wagner, A pedagogical implementation of A5/1, http://www.scard.org , May 1999.
4. Lect Notes Comput Sci;J. Golic,1997
5. M. E. Hellman, A Cryptanalytic Time-Memory Trade-Off, IEEE Transactions on Information Theory, Vol. IT-26,N4, pp.401–406, July 1980.
Cited by
134 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献