E0 (cipher) (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "E0 (cipher)" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
207th place
136th place
5,032nd place
3,357th place
low place
low place
low place
low place
1st place
1st place
low place
low place

doi.org

  • Hermelin, Miia; Kaisa Nyberg (1999). "Correlation Properties of the Bluetooth Combiner". Information Security and Cryptology - ICISC'99 (PDF). Lecture Notes in Computer Science. Vol. 1787. Helsinki, Finland: Nokia Research Centre. pp. 17–29. CiteSeerX 10.1.1.40.9412. doi:10.1007/10719994_2. ISBN 978-3-540-67380-4. {{cite book}}: |journal= ignored (help)
  • Lu, Yi; Serge Vaudenay (2004). "Cryptanalysis of Bluetooth Keystream Generator Two-Level E0". Advances in Cryptology - ASIACRYPT 2004. Lecture Notes in Computer Science. Vol. 3329. pp. 483–499. doi:10.1007/978-3-540-30539-2_34. ISBN 978-3-540-23975-8. {{cite book}}: |journal= ignored (help)
  • Lu, Yi; Meier, Willi; Vaudenay, Serge (2005). "The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption". Advances in Cryptology – CRYPTO 2005 (PDF). Lecture Notes in Computer Science. Vol. 3621. Santa Barbara, California, USA. pp. 97–117. CiteSeerX 10.1.1.323.9416. doi:10.1007/11535218_7. ISBN 978-3-540-28114-6. {{cite book}}: |journal= ignored (help)CS1 maint: location missing publisher (link)

iacr.org

eprint.iacr.org

iacr.org

iki.fi

itfind.or.kr

  • Hermelin, Miia; Kaisa Nyberg (1999). "Correlation Properties of the Bluetooth Combiner". Information Security and Cryptology - ICISC'99 (PDF). Lecture Notes in Computer Science. Vol. 1787. Helsinki, Finland: Nokia Research Centre. pp. 17–29. CiteSeerX 10.1.1.40.9412. doi:10.1007/10719994_2. ISBN 978-3-540-67380-4. {{cite book}}: |journal= ignored (help)

lasecepfl.ch

psu.edu

citeseerx.ist.psu.edu

  • Hermelin, Miia; Kaisa Nyberg (1999). "Correlation Properties of the Bluetooth Combiner". Information Security and Cryptology - ICISC'99 (PDF). Lecture Notes in Computer Science. Vol. 1787. Helsinki, Finland: Nokia Research Centre. pp. 17–29. CiteSeerX 10.1.1.40.9412. doi:10.1007/10719994_2. ISBN 978-3-540-67380-4. {{cite book}}: |journal= ignored (help)
  • Lu, Yi; Meier, Willi; Vaudenay, Serge (2005). "The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption". Advances in Cryptology – CRYPTO 2005 (PDF). Lecture Notes in Computer Science. Vol. 3621. Santa Barbara, California, USA. pp. 97–117. CiteSeerX 10.1.1.323.9416. doi:10.1007/11535218_7. ISBN 978-3-540-28114-6. {{cite book}}: |journal= ignored (help)CS1 maint: location missing publisher (link)

web.archive.org