Sciweavers

6 search results - page 1 / 2
» Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Sort
View
ASIACRYPT
2004
Springer
13 years 10 months ago
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Yi Lu 0002, Serge Vaudenay
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
13 years 10 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
JOC
2008
92views more  JOC 2008»
13 years 5 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
FSE
2006
Springer
99views Cryptology» more  FSE 2006»
13 years 9 months ago
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
The main application of stream ciphers is online-encryption of arbitrarily long data, for example when transmitting speech data between a Bluetooth headset and a mobile GSM phone o...
Matthias Krause, Dirk Stegemann
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay