Author:
Ding Lin,Gu Dawu,Wang Lei,Jin Chenhui,Guan Jie
Publisher
Springer Science and Business Media LLC
Reference9 articles.
1. Biham E, Dunkelman O. Cryptanalysis of the A5/1 GSM stream cipher. In: Proceedings of INDOCRYPT 2000, Calcutta, 2000. 43–51
2. Simpson L, Dawson E, Golic J, et al. LILI keystream generator. In: Proceedings of SAC 2000, Ontario, 2000. 248–261
3. Babbage S, Dodd M. The MICKEY stream ciphers. In: New Stream Cipher Designs. Berlin: Springer, 2008. 191–209
4. Li L, Liu X H, Wang Z, et al. An improved attack on clock-controlled shift registers based on hardware implementation. Sci China Inf Sci, 2013, 56: 112107
5. Hu J, Li R L, Tang C J. A real-time inversion attack on the GMR-2 cipher used in the satellite phones. Sci China Inf Sci, 2018, 61: 032113
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献