Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
32
views
18
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,111
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2010
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
other
Author(s):
Orr Dunkelman
,
Nathan Keller
,
Adi Shamir
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ChemSpider related publications
Most cited references
18
Record
: found
Abstract
: not found
Book Chapter
: not found
The Boomerang Attack
David V Wagner
(1999)
0
comments
Cited
51
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
John H. Kelsey
,
Bruce Schneier
,
David D. Wagner
(1996)
0
comments
Cited
39
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Related-Key Cryptanalysis of the Full AES-192 and AES-256
Alex Biryukov
,
Dmitry Khovratovich
(2009)
0
comments
Cited
35
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 393-410
DOI:
10.1007/978-3-642-14623-7_21
SO-VID:
4effc424-8da5-4022-9dc2-39d7454a5d47
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
pp. 21
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
pp. 707
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
pp. 41
Protecting Cryptographic Keys against Continual Leakage
pp. 59
Securing Computation against Continuous Leakage
pp. 80
An Efficient and Parallel Gaussian Sampler for Lattices
pp. 98
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
pp. 116
Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness
pp. 138
Additively Homomorphic Encryption with d-Operand Multiplications
pp. 155
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
pp. 209
Structure-Preserving Signatures and Commitments to Group Elements
pp. 314
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
pp. 351
Correcting Errors in RSA Private Keys
pp. 393
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
pp. 538
Protocols for Multiparty Coin Toss with Dishonest Majority
pp. 558
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
pp. 613
On Generalized Feistel Networks
pp. 631
Cryptographic Extraction and Key Derivation: The HKDF Scheme
pp. 649
Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
pp. 666
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
pp. 685
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
pp. 724
Sampling in a Quantum Population, and Applications
Similar content
3,111
New Integral Characteristics of KASUMI Derived by Division Property
Authors:
Nobuyuki Sugio
,
Yasutaka Igarashi
,
Toshinobu Kaneko
…
Cytotoxic activity of hexane extracts of Psidium guajava L (Myrtaceae) and Cassia alata L (Caesalpineaceae) in Kasumi-1 and OV2008 Cancer cell lines
Authors:
A.S. Levy
,
C. Shanna-kay
The cytotoxic effects of Moringa oleifera leaf extract and silver nanoparticles on human kasumi-1 cells
Authors:
KZ Khor
,
J Joseph
,
F Shamsuddin
See all similar
Cited by
9
The LED Block Cipher
Authors:
Jian Xin Guo
,
Thomas Peyrin
,
Axel Poschmann
…
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors
Authors:
Deukjo Hong
,
Jung-Keun Lee
,
Dong-Chan Kim
…
Boomerang Connectivity Table: A New Cryptanalysis Tool
Authors:
Carlos Cid
,
Tao Huang
,
Thomas Peyrin
…
See all cited by