Sciweavers

6 search results - page 2 / 2
» Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Sort
View
103
Voted
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
15 years 4 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois