A real-time inversion attack on the GMR-2 cipher used in the satellite phones
Crossref DOI link: https://doi.org/10.1007/s11432-017-9230-8
Published Online: 2018-02-01
Published Print: 2018-03
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Hu, Jiao
Li, Ruilin
Tang, Chaojing
Text and Data Mining valid from 2018-02-01
Article History
Received: 12 May 2017
Accepted: 19 July 2017
First Online: 1 February 2018