Issue No.10 - October (2009 vol.42)
George W. Dinolt , Naval Postgraduate School
James Bret Michael , Naval Postgraduate School
Nikolaos Petrakos , Hellenic Navy
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2009.318
Formally evaluating the strengths of a given cryptosystem will ensure that no flaws have crept into the application.
Cube-type algebraic attacks, Wireless-encryption protocols, Linear-feedback shift registers, Security
George W. Dinolt, James Bret Michael, Nikolaos Petrakos, "Cube-Type Algebraic Attacks on Wireless Encryption Protocols", Computer, vol.42, no. 10, pp. 103-105, October 2009, doi:10.1109/MC.2009.318