{"id":"https://openalex.org/W4417169361","doi":"https://doi.org/10.1109/dsd67783.2025.00038","title":"Algebraic Cryptanalysis of Small-Scale Variants of the Bluetooth Stream Cipher E0","display_name":"Algebraic Cryptanalysis of Small-Scale Variants of the Bluetooth Stream Cipher E0","publication_year":2025,"publication_date":"2025-09-10","ids":{"openalex":"https://openalex.org/W4417169361","doi":"https://doi.org/10.1109/dsd67783.2025.00038"},"language":null,"primary_location":{"id":"doi:10.1109/dsd67783.2025.00038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsd67783.2025.00038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th Euromicro Conference on Digital System Design (DSD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024445587","display_name":"Jan Dolej\u0161","orcid":null},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Jan Dolej\u0161","raw_affiliation_strings":["Czech Technical University in Prague,Faculty of Information Technology,Department of Information Security,Czechia"],"affiliations":[{"raw_affiliation_string":"Czech Technical University in Prague,Faculty of Information Technology,Department of Information Security,Czechia","institution_ids":["https://openalex.org/I44504214"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033203359","display_name":"Martin Jure\u010dek","orcid":"https://orcid.org/0000-0002-6546-8953"},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Martin Jure\u010dek","raw_affiliation_strings":["Czech Technical University in Prague,Faculty of Information Technology,Department of Information Security,Czechia"],"affiliations":[{"raw_affiliation_string":"Czech Technical University in Prague,Faculty of Information Technology,Department of Information Security,Czechia","institution_ids":["https://openalex.org/I44504214"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071351394","display_name":"R\u00f3bert L\u00f3rencz","orcid":"https://orcid.org/0000-0001-5444-8511"},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"R\u00f3Bert L\u00f3Rencz","raw_affiliation_strings":["Czech Technical University in Prague,Faculty of Information Technology,Department of Information Security,Czechia"],"affiliations":[{"raw_affiliation_string":"Czech Technical University in Prague,Faculty of Information Technology,Department of Information Security,Czechia","institution_ids":["https://openalex.org/I44504214"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024445587"],"corresponding_institution_ids":["https://openalex.org/I44504214"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46789701,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"198","last_page":"205"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.8748000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.8748000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.03480000048875809,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.030400000512599945,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystream","display_name":"Keystream","score":0.9516000151634216},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.8101000189781189},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6625999808311462},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5332000255584717},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.5016000270843506},{"id":"https://openalex.org/keywords/correlation-attack","display_name":"Correlation attack","score":0.48969998955726624},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.47519999742507935},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.4262000024318695}],"concepts":[{"id":"https://openalex.org/C2776132008","wikidata":"https://www.wikidata.org/wiki/Q1509893","display_name":"Keystream","level":4,"score":0.9516000151634216},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.8101000189781189},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6625999808311462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6198999881744385},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5332000255584717},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.5016000270843506},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.48969998955726624},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.47519999742507935},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.460099995136261},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.4262000024318695},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.41769999265670776},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.4171000123023987},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36910000443458557},{"id":"https://openalex.org/C151607707","wikidata":"https://www.wikidata.org/wiki/Q11673206","display_name":"Higher-order differential cryptanalysis","level":5,"score":0.365200012922287},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.36010000109672546},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3587999939918518},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.3522000014781952},{"id":"https://openalex.org/C2775997480","wikidata":"https://www.wikidata.org/wiki/Q586277","display_name":"Degree (music)","level":2,"score":0.3479999899864197},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3361000120639801},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.3278000056743622},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.29249998927116394},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.28780001401901245},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.2782999873161316},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.26269999146461487},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsd67783.2025.00038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsd67783.2025.00038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th Euromicro Conference on Digital System Design (DSD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W21495996","https://openalex.org/W1572961947","https://openalex.org/W1605798759","https://openalex.org/W1976677460","https://openalex.org/W2123542192","https://openalex.org/W4236509984","https://openalex.org/W4240837394","https://openalex.org/W4292701992","https://openalex.org/W4402993964"],"related_works":[],"abstract_inverted_index":{"E0":[0,54,127],"encryption":[1],"is":[2,14],"primarily":[3],"used":[4,60],"in":[5,37,61],"Bluetooth":[6,63],"devices":[7,20,38],"to":[8,100,182,204,221],"ensure":[9],"secure":[10,22],"communication,":[11],"and":[12,35,92,122,151,209],"it":[13],"also":[15],"integrated":[16],"into":[17],"various":[18],"IoT":[19],"for":[21,32,202,219],"data":[23],"transmission.":[24],"Small-scale":[25],"variants":[26,51],"of":[27,49,52,70,90,95,105,118,125,144,154,166,180,195,197,212,214,233],"$\\mathbf{E":[28],"0}$":[29],"are":[30,188],"explored":[31],"optimizing":[33],"performance":[34],"security":[36],"with":[39,173],"limited":[40],"computational":[41,171],"resources.":[42],"This":[43],"study":[44],"explores":[45],"the":[46,53,62,68,71,79,85,88,93,102,106,116,123,142,152,164,174,193,210,230],"algebraic":[47,231],"cryptanalysis":[48],"small-scale":[50,126],"stream":[55],"cipher,":[56],"a":[57,178],"legacy":[58],"cipher":[59],"protocol.":[64],"By":[65],"systematically":[66],"reducing":[67],"size":[69,124],"linear":[72,113],"feedback":[73],"shift":[74],"registers":[75],"(LFSRs)":[76],"while":[77],"preserving":[78],"cipher\u2019s":[80],"core":[81],"structure,":[82],"we":[83,138,191],"investigate":[84],"relationship":[86,114],"between":[87,115],"number":[89,94,117,165],"unknowns":[91],"consecutive":[96,119,206,223],"keystream":[97,120,167,207,224],"bits":[98,121,168],"required":[99],"recover":[101],"internal":[103],"states":[104],"LFSRs.":[107],"Our":[108,158],"work":[109],"demonstrates":[110],"an":[111],"approximately":[112],"variants,":[128],"as":[129],"indicated":[130],"by":[131],"our":[132],"experimental":[133,159],"results.":[134],"To":[135],"this":[136],"end,":[137],"utilize":[139],"two":[140],"approaches:":[141],"computation":[143],"Gr\u00f6bner":[145],"bases":[146],"using":[147],"Magma\u2019s":[148],"F4":[149,175],"algorithm":[150,176],"application":[153],"CryptoMiniSat\u2019s":[155],"SAT":[156],"solver.":[157],"results":[160,228],"show":[161],"that":[162],"increasing":[163],"significantly":[169],"improves":[170],"efficiency,":[172],"achieving":[177],"speedup":[179],"up":[181,203,220],"$733":[183],"\\times$":[184],"when":[185],"additional":[186],"equations":[187,196,213],"supplied.":[189],"Furthermore,":[190],"verify":[192],"non-existence":[194,211],"degree":[198,215],"four":[199],"or":[200,217],"lower":[201,218],"seven":[205],"bits,":[208,225],"three":[216],"eight":[222],"extending":[226],"prior":[227],"on":[229],"properties":[232],"E0.":[234]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-09T00:00:00"}
