Security enhancements against UMTS-GSM interworking attacks
暂无分享,去创建一个
[1] Eli Biham,et al. Conditional Estimators: An Effective Attack on A5/1 , 2005, Selected Areas in Cryptography.
[2] Henri Gilbert. The Security of "One-Block-to-Many" Modes of Operation , 2003, FSE.
[3] Thomas Johansson,et al. Another attack on A5/1 , 2003, IEEE Trans. Inf. Theory.
[4] Andrey Bogdanov,et al. A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations , 2007, CHES.
[5] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[6] Ulrike Meyer,et al. A man-in-the-middle attack on UMTS , 2004, WiSe '04.
[7] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Ulrike Meyer,et al. On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[10] Sufian Yousef,et al. A New Authentication Protocol for UMTS Mobile Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[11] Chung-Ming Huang,et al. Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[12] Eli Biham,et al. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.
[13] A. Masood,et al. Improved Results on Algebraic Cryptanalysis of A5/2 , 2008 .
[14] Eli Biham,et al. Cryptanalysis of the A5/1 GSM Stream Cipher , 2000, INDOCRYPT.