Back to Results
First PageMeta Content
Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms


A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France
Add to Reading List

Document Date: 2010-12-02 17:52:59


Open Document

File Size: 250,72 KB

Share Result on Facebook
UPDATE