Explore a cutting-edge cryptanalysis technique for Bluetooth encryption presented at Crypto 2013 by researchers Bin Zhang, Chao Xu, and Dengguo Feng. Delve into the intricacies of real-time attacks on Bluetooth security protocols and gain insights into potential vulnerabilities in wireless communication systems. Learn about the methodologies employed by the authors to analyze and potentially compromise Bluetooth encryption in real-time scenarios.
Overview
Syllabus
Real Time Cryptanalysis of Bluetooth Encryption with Con ...
Taught by
TheIACR