Back to Results
First PageMeta Content
A5/1 / Linear feedback shift register / VEST / Shift register / Cryptanalysis / ICE / GSM / Grain / Linear cryptanalysis / Cryptography / Stream ciphers / Pseudorandom number generators


Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis Thomas Pornin and Jacques Stern ´ D´epartement d’Informatique, Ecole Normale Sup´erieure
Add to Reading List

Document Date: 2013-06-04 22:24:52


Open Document

File Size: 116,42 KB

Share Result on Facebook

Company

Compaq / Hardware Trade / Springer-Verlag Berlin Heidelberg 2000 Software / Xilinx / /

Currency

USD / /

/

Facility

Alpha station / /

IndustryTerm

chosen algorithm / level algorithm / tricky software / software implementation / correct algorithm / 4010E chip / recursive search / software part / exhaustive search workload / software checks / main web site / exhaustive search / web publication / software cryptanalysis / /

OperatingSystem

XP / /

Organization

Ecole Normale Sup´erieure / GSM / /

Person

Ross Anderson / Jovan Dj / Marc Briceno / Alex Biryukov / Ian Goldberg / Jacques Stern / David Wagner / Adi Shamir / /

/

Product

Pamette / Pamette Card / /

ProgrammingLanguage

D / /

ProvinceOrState

A5 / /

Technology

Alpha / FPGA / correct algorithm / RAM / following algorithm / chosen algorithm / 21264 Alpha processor / fifth chip / high-level algorithm / mobile phones / two technologies / SDRAM / GSM / GSM protocol / expensive 21264 Alpha processor / 4010E chip / stream cipher / /

URL

http /

SocialTag