Library Automation and Digital Archive
LONTAR
Fakultas Ilmu Komputer
Universitas Indonesia

Pencarian Sederhana

Find Similar Add to Favorite

Call Number 005.82 Cry
Collection Type Indeks Artikel LNCS
Title On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318
Author Testsu Iwata and Kaoru Kurosawa;
Publisher Springer, 2003
Subject
Location
Lokasi : Perpustakaan Fakultas Ilmu Komputer
Nomor Panggil ID Koleksi Status
005.82 Cry TERSEDIA
Tidak ada review pada koleksi ini: 42174
F8 dan F5 are standarlized by 3GPP to provide confidentiality and integrity, respectively. It was claimed that F8 and F9 are secure it the underlying block cipher is a Pseudo Random Permutation (PRP), where F9 is a alightly modified version of F9. In this paper, however, we disprove both claims by showing a countexexample. We fist construct a PRP F with the following property . There isa constant cst such that for any key K, Fk(,)=FK (.) We then show that F8 and F9 are comepletely insecure if F is used as the underlying imply the security of F8 and F9 and it is imposible to prove their security under PRP assumption It should be attessed hat these results do not implly the original F8 dan F9 (with KASUMI as the underflying block chipher) are insure, or broken They simply undermini their provable security
Favorite
Proactive fault-management in software systems, Hal. 3-6
Author: Kishor S. Trivedi; | Publisher: Proceedings: the 3rd annual simulation symposium, Washington D.C, 16-20 April 2000
[Remove]
Analisis Orientasi Sentimen dan Ekstraksi Aspek dalam Aktivitas Pemantauan Media Sosial pada PT XYZ
Author: Dhanika Jeihan Aguinta; | Publisher: Jakarta : Program Studi Magister Teknologi Informasi Fasilkom UI, 2023
[Remove]
Inventory collection system pada sebuah local area network dengan memanfaatkan java management extensions, Hal. VII.32-VII.35
Author: Destana D. Mulidani; Sugianto, Jusah; | Publisher: SNASTI 2006 (Seminar Nasional Sistem
[Remove]
Sistem informasi bagian umum: Laporan kerja praktek pada NVPD Soedarpo Corporation
Author: Denny Yerianto; | Publisher: Depok : Fakultas Ilmu Komputer Unversitas Indonesia, 1991
[Remove]
JXTA-overlay: A P2P system for groupware tools, HAL. 9-19
Author: Fatos Zhafa; Leonard Barolli; Raul Fernandez; Thanasis Daradoumis; Makoto Takizawa; | Publisher: Proceeding of MoMM2007
[Remove]
Trust tranfer dan pengaruhnya terhadap penggunaan kembali personal cloud strorage service
Author: Tania Putri Permatasari; | Publisher: DepoK: Fakultas Ilmu Kopmputer UI, 2016
[Remove]
Static profile-driven compilation for FPGAs, (LNCS-Lecture Notes in Computer Science 2147) Hal 112-122
Author: Srihari Cadambi; Seth Copen Goldstein; | Publisher: Springer, 2001
[Remove]