Sciweavers

40 search results - page 8 / 8
» Nonlinear Equivalence of Stream Ciphers
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 5 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
14 years 11 days ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
ENGL
2006
80views more  ENGL 2006»
13 years 5 months ago
Modelling, simulation and proportional integral control of a pneumatic motor
Researchers have shown a considerable amount of interest in the control of pneumatic drives over the past decade, for two main reasons, firstly, the response of the system is very ...
R. Marumo, M. O. Tokhi