Back to Results
First PageMeta Content
A5/1 / Linear feedback shift register / Cellular Message Encryption Algorithm / Py / Correlation attack / RC4 / Cryptography / Stream ciphers / Keystream


Cryptanalysis of ORYX D. Wagner1 , L. Simpson2 , E. Dawson2 , J. Kelsey3 , W. Millan2 , and B. Schneier3 1 University of California, Berkeley
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 155,51 KB

Share Result on Facebook

City

Brisbane / Minneapolis / /

Company

Counterpane Systems / /

Continent

North America / Europe / /

Country

Australia / /

/

Facility

Information Security Research Centre / Queensland University of Technology GPO Box / University of California / /

IndustryTerm

cellular communications / generation mobile telephone devices / generation mobile communications devices / mobile communications systems / voice privacy algorithm / cellular message encryption algorithm / mobile telecommunications / digital mobile communications systems / digital cellular systems / depth-first search / secure mobile communications environment / telephony / cryptographic algorithms / encryption algorithms / generation mobile communications / challenge-response authentication protocols / wireless data services / authentication algorithm / exhaustive search / case analog encryption devices / /

NaturalFeature

ORYX stream / /

Organization

Telecommunications Industry Association / University of California / Berkeley / Information Security Research Centre / Queensland University of Technology GPO Box / /

Person

Osborne McGraw-Hill / /

ProvinceOrState

ORYX / LFSRB / LFSRK / California / Minnesota / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption / challenge-response authentication protocols / ORYX algorithm / 3.1 Attack Algorithm / encryption algorithms / CDMA / CMEA algorithm / cellular message encryption algorithm / block cipher / known algorithm / cloning / COMP128 authentication algorithm / GSM / secret key / TDMA / voice privacy algorithm / cryptographic algorithms / stream cipher / /

URL

http /

SocialTag