{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:41:11Z","timestamp":1762004471519,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T00:00:00Z","timestamp":1366156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,17]]},"DOI":"10.1145\/2462096.2462110","type":"proceedings-article","created":{"date-parts":[[2013,4,16]],"date-time":"2013-04-16T13:51:28Z","timestamp":1366120288000},"page":"79-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["The weakness of integrity protection for LTE"],"prefix":"10.1145","author":[{"given":"Teng","family":"Wu","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Document 2: SNOW 3G Specification","author":"Confidentiality GPP.","year":"2006","unstructured":"3 GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification . September 2006 . 3GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification. September 2006."},{"key":"e_1_3_2_1_2_1","first-page":"f9","volume":"1","author":"Confidentiality GPP.","year":"2007","unstructured":"3 GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms . Document 1 : f8 and f9 Specification. 2007 . 3GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms. Document 1: f8 and f9 Specification. 2007.","journal-title":"Document"},{"key":"e_1_3_2_1_3_1","volume-title":"Document 2: Kasumi Specification","author":"Confidentiality GPP.","year":"2007","unstructured":"3 GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms . Document 2: Kasumi Specification . June 2007 . 3GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms. Document 2: Kasumi Specification. June 2007."},{"key":"e_1_3_2_1_4_1","volume-title":"128-EEA3 and 128-EIA3 Specification","author":"Confidentiality GPP.","year":"2011","unstructured":"3 GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1 : 128-EEA3 and 128-EIA3 Specification . January 2011 . 3GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification. January 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"Document 2: ZUC Specification","author":"Confidentiality GPP.","year":"2011","unstructured":"3 GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC Specification . January 2011 . 3GPP. Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC Specification. January 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2011.044106"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706031"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646760.706005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704136"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1201\/b12078","volume-title":"Communication System Security","author":"Chen L.","year":"2012","unstructured":"L. Chen and G. Gong . Communication System Security , chapter 10, pages 358 -- 359 . CRC Press Taylor & Francis Group , 2012 . L. Chen and G. Gong. Communication System Security, chapter 10, pages 358--359. CRC Press Taylor & Francis Group, 2012."},{"key":"e_1_3_2_1_11_1","first-page":"315","volume":"13","author":"Erez P.","year":"2000","unstructured":"P. Erez and R. Charles . CBC MAC for Real-Time Data Sources. J. Cryptology , 13 : 315 -- 338 , 2000 . P. Erez and R. Charles. CBC MAC for Real-Time Data Sources. J. Cryptology, 13:315--338, 2000.","journal-title":"CBC MAC for Real-Time Data Sources. J. Cryptology"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767011.1767016"},{"key":"e_1_3_2_1_13_1","volume-title":"The CMAC Mode for Authentication. NIST Special Publication 800-38B","author":"Block Cipher NIST.","year":"2005","unstructured":"NIST. Recommendation for Block Cipher Mode of Operation : The CMAC Mode for Authentication. NIST Special Publication 800-38B . 2005 . NIST. Recommendation for Block Cipher Mode of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B. 2005."},{"key":"e_1_3_2_1_14_1","volume-title":"Galois\/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D","author":"Block Cipher NIST.","year":"2007","unstructured":"NIST. Recommendation for Block Cipher Modes of Operation : Galois\/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D . 2007 . NIST. Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D. 2007."},{"key":"e_1_3_2_1_15_1","volume-title":"Black Hat Conference","author":"Perez D.","year":"2011","unstructured":"D. Perez and J. Pico . A Practical Attack Against GPRS\/EDGE\/UMTS\/HSPA Mobile Data Communications . Presented in Black Hat Conference , 2011 . D. Perez and J. Pico. A Practical Attack Against GPRS\/EDGE\/UMTS\/HSPA Mobile Data Communications. Presented in Black Hat Conference, 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34047-5_13"},{"key":"e_1_3_2_1_17_1","first-page":"137","volume-title":"FSE 2003, FSE '03","author":"Tetsu I.","year":"2002","unstructured":"I. Tetsu and K. Kaoru . OMAC: One-Key CBC MAC. In Pre-proceedings of Fast Software Encryption , FSE 2003, FSE '03 , pages 137 -- 161 . Springer-Verlag , 2002 . I. Tetsu and K. Kaoru. OMAC: One-Key CBC MAC. In Pre-proceedings of Fast Software Encryption, FSE 2003, FSE '03, pages 137--161. Springer-Verlag, 2002."},{"key":"e_1_3_2_1_18_1","volume-title":"A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3. IACR Cryptology ePrint Archive","author":"Thomas F.","year":"2010","unstructured":"F. Thomas , G. Henri , R. Jean-Rene , and M. Videau . A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3. IACR Cryptology ePrint Archive , 2010 :168, 2010. F. Thomas, G. Henri, R. Jean-Rene, and M. Videau. A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3. IACR Cryptology ePrint Archive, 2010:168, 2010."}],"event":{"name":"WISEC'13: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Budapest Hungary","acronym":"WISEC'13"},"container-title":["Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462110","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462096.2462110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:39Z","timestamp":1750236519000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462096.2462110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,17]]},"references-count":18,"alternative-id":["10.1145\/2462096.2462110","10.1145\/2462096"],"URL":"https:\/\/doi.org\/10.1145\/2462096.2462110","relation":{},"subject":[],"published":{"date-parts":[[2013,4,17]]},"assertion":[{"value":"2013-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}