{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:52:20Z","timestamp":1777895540957,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540383413","type":"print"},{"value":"9783540383437","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_14","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"187-202","source":"Crossref","is-referenced-by-count":14,"title":["Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD\u2019s"],"prefix":"10.1007","author":[{"given":"Yaniv","family":"Shaked","sequence":"first","affiliation":[]},{"given":"Avishai","family":"Wool","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Specification of the Bluetooth system, v.1.2. Core specification (2003), Available from: http:\/\/www.bluetooth.org\/spec"},{"key":"14_CR2","unstructured":"Ekdahl, P., Johansson, T.: Some results on correlation in the bluetooth stream cipher. In: Proc. of the 10th Joint Conference on Communication and Coding 2000, Obertauern, Austria (March 2000)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/3-540-45537-X_3","volume-title":"Selected Areas in Cryptography","author":"S.R. Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Lucks, S.: Analysis of the E0 encryption system. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, p. 38. Springer, Heidelberg (2001)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-46035-7_16","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J.D.. Goli\u0107","year":"2002","unstructured":"Goli\u0107, J.D., Bagini, V., Morgari, G.: Linear cryptanalysis of bluetooth stream cipher. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, p. 238. Springer, Heidelberg (2002)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/10719994_2","volume-title":"Information Security and Cryptology - ICISC\u201999","author":"M. Hermelin","year":"2000","unstructured":"Hermelin, M., Nyberg, K.: Correlation properties of the Bluetooth combiner generator. In: Song, J.S. (ed.) ICISC 1999. LNCS, vol.\u00a01787, pp. 17\u201329. Springer, Heidelberg (2000)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/3-540-45353-9_14","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M. Jakobsson","year":"2001","unstructured":"Jakobsson, M., Wetzel, S.: Security weaknesses in bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 176\u2013191. Springer, Heidelberg (2001)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-46035-7_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2002","author":"M. Krause","year":"2002","unstructured":"Krause, M.: BDD-based cryptanalysis of keystream generators. In: Knudsen, L. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 222\u2013237. Springer, Heidelberg (2002)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/11799313_11","volume-title":"Fast Software Encryption","author":"M. Krause","year":"2006","unstructured":"Krause, M., Stegemann, D.: Reducing the space complexity of BDD-based attacks on keystream generators. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 163\u2013178. Springer, Heidelberg (2006)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/11535218_7","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"Y. Lu","year":"2005","unstructured":"Lu, Y., Meier, W., Vaudenay, S.: The conditional correlation attack: A practical attack on bluetooth encryption. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 97\u2013117. Springer, Heidelberg (2005)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-540-28628-8_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"Y. Lu","year":"2004","unstructured":"Lu, Y., Vaudenay, S.: Faster correlation attack on bluetooth keystream generator E0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 407\u2013425. Springer, Heidelberg (2004)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Levy, O., Wool, A.: A uniform framework for cryptanalysis of the Bluetooth E 0 cipher. In: Proc. 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), Athens, Greece, September 2005, pp. 365\u2013373 (2005)","DOI":"10.1109\/SECURECOMM.2005.1"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Michon, J.-F., Valarcher, P., Yun\u00e9s, J.-B.: HFE and BDDs: A practical attempt at cryptanalysis. In: International Workshop on Coding Cryptography and Combinatorics, Huangshan (June 2003) (China)","DOI":"10.1007\/978-3-0348-7865-4_16"},{"key":"14_CR13","unstructured":"Saarinen, M.-J.O.: Re: Bluetooth and E 0. Post to sci.crypt.research (September 2000)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: Proc. 3rd USENIX\/ACM Conf. Mobile Systems, Applications, and Services (MobiSys), pp. 39\u201350 (June 2005)","DOI":"10.1145\/1067170.1067176"},{"key":"14_CR15","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719789","volume-title":"Branching programs and binary decision diagrams","author":"I. Wegener","year":"2000","unstructured":"Wegener, I.: Branching programs and binary decision diagrams. SIAM, Philadelphia (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T02:58:51Z","timestamp":1736564331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11836810_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}