{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:08:16Z","timestamp":1759147696734},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747345"},{"type":"electronic","value":"9783540747352"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74735-2_27","type":"book-chapter","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T10:33:47Z","timestamp":1187778827000},"page":"394-412","source":"Crossref","is-referenced-by-count":10,"title":["A Hardware-Assisted Realtime Attack on A5\/2 Without Precomputations"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Bogdanov","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]},{"given":"Andy","family":"Rupp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_1","volume-title":"Selected Areas in Cryptography","author":"E. Barkan","year":"2006","unstructured":"Barkan, E., Biham, E.: Conditional estimatores: An Effective Attack on A5\/1. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897. Springer, Heidelberg (2006)"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"E. Barkan","year":"2003","unstructured":"Barkan, E., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communications. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729. Springer, Heidelberg (2003)"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"E. Biham","year":"2000","unstructured":"Biham, E., Dunkelman, O.: Cryptanalysis of the A5\/1 GSM Stream Cipher. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol.\u00a01977. Springer, Heidelberg (2000)"},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_1","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A., Wagner, D.: Real Time Cryptanalysis of A5\/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, Springer, Heidelberg (2001)"},{"key":"27_CR5","first-page":"237","volume-title":"Proc. of FCCM 2006","author":"A. Bogdanov","year":"2006","unstructured":"Bogdanov, A., Mertens, M., Paar, C., Pelzl, J., Rupp, A.: A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). In: Proc. of FCCM 2006, pp. 237\u2013248. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Mertens, M., Paar, C., Pelzl, J., Rupp, A.: SMITH - a Parallel Hardware Architecture for fast Gaussian Elimination over GF(2). In: Workshop on Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS 2006), Conference Records (2006)","DOI":"10.1109\/FCCM.2006.12"},{"key":"27_CR7","unstructured":"Briceno, M., Goldberg, I., Wagner, D.: A Pedagogical Implementation of the GSM A5\/1 and A5\/2 \u201dvoice privacy\u201d Encryption Algorithms (1999), http:\/\/cryptome.org\/gsm-a512.html"},{"key":"27_CR8","unstructured":"Intel Corporation: Intel Unveils World\u2019s Best Processor. Press Release (July 27, 2006)"},{"issue":"1","key":"27_CR9","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TIT.2002.806129","volume":"49","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: Another Attack on A5\/1. IEEE Transactions on Information Theory\u00a049(1), 284\u2013289 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"key":"27_CR10","unstructured":"Goldberg, I., Wagner, D., Green, L.: The Real-Time Cryptanalysis of A5\/2. In: Presented at the Rump Session of Crypto 1999 (1999)"},{"key":"27_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J. Golic","year":"1997","unstructured":"Golic, J.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 239\u2013255. Springer, Heidelberg (1997)"},{"issue":"9","key":"27_CR12","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1109\/12.29471","volume":"38","author":"B. Hochet","year":"1989","unstructured":"Hochet, B., Quintin, P., Robert, Y.: Systolic Gaussian Elimination Over GF(p) with Partial Pivoting. IEEE Trans. Comput.\u00a038(9), 1321\u20131324 (1989)","journal-title":"IEEE Trans. Comput."},{"key":"27_CR13","unstructured":"European Telecommunications Standards Institute: Digital Cellular Telecommunications System (Phase 2+); Channel Coding (GSM 05.03 Version 8.5.1 Release 1999) (1999), http:\/\/www.etsi.org"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","first-page":"239","volume-title":"Selected Areas in Cryptography","author":"A. Maximov","year":"2004","unstructured":"Maximov, A., Johansson, T., Babbage, S.: An Improved Correlation Attack on A5\/1. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 239\u2013255. Springer, Heidelberg (2004)"},{"key":"27_CR15","unstructured":"Petrovic, S., Fuster-Sabater, A.: Cryptanalysis of the A5\/2 Algorithm. IACR ePrint Report 200\/52 (2000), http:\/\/eprint.iacr.org"},{"key":"27_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/3-540-44499-8_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"T. Pornin","year":"2000","unstructured":"Pornin, T., Stern, J.: Software-hardware Trade-offs: Application to A5\/1 Cryptanalysis. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 318\u2013327. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74735-2_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:35:18Z","timestamp":1619519718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74735-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540747345","9783540747352"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74735-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}