COMP128

Results: 6



#Item
1

On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards Ryan Zhou, Yu Yu, F-X Standaert, Jean-Jacques Quisquater Brightsight

Add to Reading List

Source URL: fc13.ifca.ai

Language: English - Date: 2013-04-04 03:04:00
    2

    On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards Yuanyuan Zhou1 , Yu Yu2 , F.-X. Standaert3 , J.-J. Quisquater3 1

    Add to Reading List

    Source URL: fc13.ifca.ai

    Language: English - Date: 2013-03-27 20:41:00
      3Universal Mobile Telecommunications System / GSM / Subscriber identity module / A5/1 / UMTS security / Roaming / SMS / COMP128 / Mobile Network Code / Technology / Mobile technology / Electronic engineering

      Solutions to the GSM Security Weaknesses † Mohsen Toorani ‡

      Add to Reading List

      Source URL: webpages.iust.ac.ir

      Language: English - Date: 2012-03-16 17:40:39
      4GSM / A5/1 / COMP128 / International Mobile Subscriber Identity / SMS / Public land mobile network / Network switching subsystem / Stream cipher / Mobile station / Technology / Mobile technology / Subscriber identity module

      A Contemporary Foreword on GSM Security Paulo S. Pagliusi Information Security Group, Royal Holloway, University of London

      Add to Reading List

      Source URL: jazi.staff.ugm.ac.id

      Language: English - Date: 2005-02-14 19:08:24
      5COMP128

      T[removed]Special Course on Cryptology A3/A8 & COMP128

      Add to Reading List

      Source URL: www.tcs.hut.fi

      Language: English - Date: 2004-11-21 18:28:51
        6Stream ciphers / A5/1 / SMS / GSM / Subscriber identity module / COMP128 / A5/2 / MISTY1 / KASUMI / Cryptography / Technology / Mobile technology

        PDF Document

        Add to Reading List

        Source URL: ipsec.pl

        Language: English - Date: 2011-05-25 09:14:43
        UPDATE