Another attack on A5/1
(2001) IEEE International Symposium on Information Theory (ISIT), 2001 p.160-160- Abstract
- A5/1 is a stream cipher used in the GSM system. Several time-memory trade-off attacks against A5/1 have been proposed previously. This paper presents a completely different attack, based on ideas from correlation attacks.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/1157776
- author
- Ekdahl, Patrik LU and Johansson, Thomas LU
- organization
- publishing date
- 2001
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- [Host publication title missing]
- pages
- 160 - 160
- conference name
- IEEE International Symposium on Information Theory (ISIT), 2001
- conference location
- Washington, DC, United States
- conference dates
- 2001-06-24 - 2001-06-29
- external identifiers
-
- scopus:0034864027
- ISBN
- 0-7803-7123-2
- DOI
- 10.1109/ISIT.2001.936023
- language
- English
- LU publication?
- yes
- id
- 5e573697-3a96-46e3-8313-4d57e53eb67c (old id 1157776)
- date added to LUP
- 2016-04-04 13:34:07
- date last changed
- 2023-09-06 17:24:45
@inproceedings{5e573697-3a96-46e3-8313-4d57e53eb67c, abstract = {{A5/1 is a stream cipher used in the GSM system. Several time-memory trade-off attacks against A5/1 have been proposed previously. This paper presents a completely different attack, based on ideas from correlation attacks.}}, author = {{Ekdahl, Patrik and Johansson, Thomas}}, booktitle = {{[Host publication title missing]}}, isbn = {{0-7803-7123-2}}, language = {{eng}}, pages = {{160--160}}, title = {{Another attack on A5/1}}, url = {{http://dx.doi.org/10.1109/ISIT.2001.936023}}, doi = {{10.1109/ISIT.2001.936023}}, year = {{2001}}, }