{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:27:03Z","timestamp":1773761223118,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540226680","type":"print"},{"value":"9783540286288","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28628-8_25","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T20:54:02Z","timestamp":1285016042000},"page":"407-425","source":"Crossref","is-referenced-by-count":51,"title":["Faster Correlation Attack on Bluetooth Keystream Generator E0"],"prefix":"10.1007","author":[{"given":"Yi","family":"Lu","sequence":"first","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-45146-4_10","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"F. Armknecht","year":"2003","unstructured":"Armknecht, F., Krause, M.: Algebraic Attacks on Combiners with Memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 162\u2013175. Springer, Heidelberg (2003)"},{"key":"25_CR2","unstructured":"Baign\u00e8res, T.: A Generalization of Linear Cryptanalysis, Diploma Thesis, EPFL (2003)"},{"key":"25_CR3","unstructured":"BluetoothTM, Bluetooth Specification, version 1.2, pp. 903-948, (November 2003), available at \n                    \n                      ccbluetooth.org"},{"key":"25_CR4","unstructured":"Canteaut, A., Chabaud, F.: A New Algorithm for Finding Minimum-weight Words in a Linear Code: Application to Primitive Narrow-sense BCH Codes of Length 511, INRIA, technical report, No. 2685 (1995)"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/3-540-45539-6_40","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Canteaut","year":"2000","unstructured":"Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks Using Parity-check Equations of Weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 573\u2013588. Springer, Heidelberg (2000)"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/3-540-44706-7_13","volume-title":"Fast Software Encryption","author":"V. Chepyzhov","year":"2001","unstructured":"Chepyzhov, V., Johansson, T., Smeets, B.: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 181\u2013195. Springer, Heidelberg (2001)"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-46035-7_14","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"P. Chose","year":"2002","unstructured":"Chose, P., Joux, A., Mitton, M.: Fast Correlation Attacks: An Algorithmic Point of View. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 209\u2013221. Springer, Heidelberg (2002)"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-45146-4_11","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 176\u2013194. Springer, Heidelberg (2003)"},{"key":"25_CR9","unstructured":"Ekdahl, P., Johansson, T.: Some Results on Correlations in the Bluetooth Stream Cipher. In: Proceedings of the 10th Joint Conference on Communications and Coding, Austria (2000)"},{"key":"25_CR10","unstructured":"Ekdahl, P.: On LFSR Based Stream Ciphers (Analysis and Design), Ph.D. Thesis, Lund Univ. (November 2003)"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/3-540-45537-X_3","volume-title":"Selected Areas in Cryptography","author":"S. Fluhrer","year":"2001","unstructured":"Fluhrer, S., Lucks, S.: Analysis of the E0 Encryption System. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 38\u201338. Springer, Heidelberg (2001)"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/BF00190805","volume":"9","author":"J.D. Goli\u0107","year":"1996","unstructured":"Goli\u0107, J.D.: Correlation Properties of a General Binary Combiner with Memory. Journal of Cryptology\u00a09, 111\u2013126 (1996)","journal-title":"Journal of Cryptology"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-46035-7_16","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J.D. Goli\u0107","year":"2002","unstructured":"Goli\u0107, J.D., Bagini, V., Morgari, G.: Linear Cryptanalysis of Bluetooth Stream Cipher. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 238\u2013255. Springer, Heidelberg (2002)"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/10719994_2","volume-title":"Information Security and Cryptology - ICISC\u201999","author":"M. Hermelin","year":"2000","unstructured":"Hermelin, M., Nyberg, K.: Correlation Properties of the Bluetooth Combiner. In: Song, J.S. (ed.) ICISC 1999. LNCS, vol.\u00a01787, pp. 17\u201329. Springer, Heidelberg (2000)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/3-540-45353-9_14","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M. Jakobsson","year":"2001","unstructured":"Jakobsson, M., Wetzel, S.: Security Weakness in Bluetooth. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 176\u2013191. Springer, Heidelberg (2001)"},{"key":"25_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/3-540-48405-1_12","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"T. Johansson","year":"1999","unstructured":"Johansson, T., Jonsson, F.: Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 181\u2013197. Springer, Heidelberg (1999)"},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-46035-7_15","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"M. Krause","year":"2002","unstructured":"Krause, M.: BDD-Based Cryptanalysis of Keystream Generators. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 222\u2013237. Springer, Heidelberg (2002)"},{"key":"25_CR18","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications, Cambridge (1986)"},{"key":"25_CR19","volume-title":"The Theory of Error-correcting Codes","author":"F.J. MacWilliams","year":"1996","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. North- Holland, Amsterdam (1996)"},{"key":"25_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/BF02252874","volume":"1","author":"W. Meier","year":"1989","unstructured":"Meier, W., Staffelbach, O.: Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology\u00a01, 159\u2013176 (1989)","journal-title":"Journal of Cryptology"},{"key":"25_CR22","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF00191322","volume":"5","author":"W. Meier","year":"1992","unstructured":"Meier, W., Staffelbach, O.: Correlation Properties of Combiners with Memory in Stream Ciphers. Journal of Cryptology\u00a05, 67\u201386 (1992)","journal-title":"Journal of Cryptology"},{"key":"25_CR23","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"J. Menezes","year":"1996","unstructured":"Menezes, J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC, Boca Raton (1996)"},{"key":"25_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-60865-6_51","volume-title":"Fast Software Encryption","author":"W. Penzhorn","year":"1996","unstructured":"Penzhorn, W.: Correlation Attacks on Stream Ciphers: Computing Low Weight Parity Checks based on Error Correcting Codes. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 159\u2013172. Springer, Heidelberg (1996)"},{"key":"25_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/3-540-39799-X_20","volume-title":"Advances in Cryptology","author":"R.A. Rueppel","year":"1986","unstructured":"Rueppel, R.A.: Correlation Immunity and the Summation Generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 260\u2013272. Springer, Heidelberg (1986)"},{"key":"25_CR26","unstructured":"Saarinen, M.: Re: Bluetooth and E0, Posted at sci.crypt.research (02\/09\/2000)"},{"key":"25_CR27","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"30","author":"T. Siegenthaler","year":"1984","unstructured":"Siegenthaler, T.: Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Transactions on Information Theory\u00a030, 776\u2013780 (1984)","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Vaudenay, S.: An Experiment on DES - Statistical Cryptanalysis. In: Proceedings of the 3rd ACM Conferences on Computer Security, pp. 139\u2013147 (1996)","DOI":"10.1145\/238168.238206"},{"key":"25_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45708-9_19","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Wagner","year":"2002","unstructured":"Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 288\u2013304. Springer, Heidelberg (2002)"},{"key":"25_CR30","first-page":"17","volume-title":"Hadamard Matrix Analysis and Synthesis with Applications to Communications and Signal\/Image Processing","author":"R.K. Yarlagadda","year":"1997","unstructured":"Yarlagadda, R.K., Hershey, J.E.: Hadamard Matrix Analysis and Synthesis with Applications to Communications and Signal\/Image Processing, pp. 17\u201322. Kluwer Academic, Dordrecht (1997)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28628-8_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:27:44Z","timestamp":1620012464000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28628-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540226680","9783540286288"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28628-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}