Security enhancements in GSM cellular standard
暂无分享,去创建一个
[1] Emin Anarim,et al. A modified stream generator for the GSM encryption algorithms A5/1 and A5/2 , 2005, 2005 13th European Signal Processing Conference.
[2] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[3] Eli Biham,et al. Cryptanalysis of the A5/1 GSM Stream Cipher , 2000, INDOCRYPT.
[4] Cunsheng Ding,et al. The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.
[5] Claude Carlet,et al. Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.
[6] Michalis D. Galanis,et al. Comparison of the hardware architectures and FPGA implementations of stream ciphers , 2004, Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems, 2004. ICECS 2004..
[7] Jovan Dj. Golic,et al. Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.
[8] Thomas Johansson,et al. Another attack on A5/1 , 2003, IEEE Trans. Inf. Theory.
[9] Eli Biham,et al. Conditional Estimators: An Effective Attack on A5/1 , 2005, Selected Areas in Cryptography.
[10] Alexander Maximov,et al. Some Words on Cryptanalysis of Stream Ciphers , 2006 .
[11] Alexander Maximov,et al. An Improved Correlation Attack on A5/1 , 2004, Selected Areas in Cryptography.
[12] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[13] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[14] Patrik Ekdahl,et al. On LFSR based Stream Ciphers - analysis and design , 2003 .
[15] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[16] Palash Sarkar,et al. Construction of Nonlinear Boolean Functions with Important Cryptographic Properties , 2000, EUROCRYPT.