—We analyse mobile propagation channels which occur in the context of car-to-car communications in the 24 GHz ISM band. From the information gathered, we design robust frame desi...
Martin Braun, Yves Koch, Christian Sturm, Friedric...
We present a structural attack against the Sidelnikov cryptosystem [8]. The attack creates a private key from a given public key. Its running time is subexponential and is effecti...