Design and evaluation report
3 posters
Page 1 of 1
Design and evaluation report
The project team that designed and evaluated the algorithms has produced a report, which explains the rationale behind the designs, and how they have been assessed against cryptanalytic attacks. The report will soon be published on the GSM Security Algorithms page, alongside the algorithm specifications. In the meantime, I'm posting it here.
- Attachments
Steve Babbage- Posts : 30
Join date : 2010-08-02
Design and evaluation report - updated
Correcting a few typos that were spotted in the original
- Attachments
Steve Babbage- Posts : 30
Join date : 2010-08-02
Re: Design and evaluation report
Are you aware that the attachments can't be opened? There's a message next to the attachments saying "You don't have permission to download attachments.".
msl- Posts : 1
Join date : 2010-08-19
Re: Design and evaluation report
msl wrote:Are you aware that the attachments can't be opened? There's a message next to the attachments saying "You don't have permission to download attachments.".
The documents can be downloaded here:
http://gsmworld.com/our-work/programmes-and-initiatives/fraud-and-security/gsm_security_algorithms.htm
sgteo- Posts : 8
Join date : 2010-08-13
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum