Использованные материалы
1. Chris Tryhorn. Nice talking to you ... mobile phone use
http://www.guardian.co.uk/tech.....ar/03/mobile-phones1 .
2. Ross J. Anderson. Security Engineering: A Guide to Building Dependable
0471389226.
3. February 2010. http://www.ing.nl/particulier/internetbankieren/
4. January 2010. https://svn.berlin.ccc.de/proj.....rprobe/wiki/tracelog
5. Elad Barkan, Eli Biham, and Nathan Keller. Instant ciphertext-only cryptanalysis
volume 2729/2003, pages 600616. Springer Berlin / Heidelb erg, 2003.
6. Orr Dunkelman, Nathan Keller, and Adi Shamir. A practical-time attack
http://eprint.iacr.org/ .
7. Marc Briceno, Ian Goldb erg, and David Wagner. A pedagogical implementa-
http://cryptome.org/gsm-a512.htm (originally on www.scard.org).
8. Jovan Golic. Cryptanalysis of Al leged A5 Stream Cipher, page 23955. 1997.
9. Elad Barkan and Eli Biham. Conditional Estimators: An Effective Attack on A5/1, page 119. 2005.
10. August 2010. http://www.global-security-sol.....com/GSAudioSurv.html .
11. January 2010. http://www.ettus.com/ .
12. Septemb er 2009. http://gnuradio.org/trac .
13. January 2010. https://svn.berlin.ccc.de/projects/airprobe/wiki .
14. January 2010. http://www.reflextor.com/trac/a51 .
15. Steve Muller and David Hulton. The a5 cracking project. In Chaos Communication Camp 2007, 2007.
16. January 2010. http://reflextor.com/torrents/ .
17. Erguler, Imran, Anarim, and Emin. A new cryptanalytic time-memory trade-off for stream ciphers. In Computer and Information Sciences – ISCIS 2005, volume 3733 of Lecture Notes in Computer Science, pages 215223. Springer Berlin / Heidelberg, 2005.
18. Jin Hong, Kyung Jeong, Eun Kwon, In-Sok Lee, and Daegun Ma. Variants of the
19. September 2009. http://openbts.sourceforge.net/ .
20. September 2009. http://bs11-abis.gnumonks.org/trac/wiki/OpenBSC .
21. Karsten Nohl and Chris Paget. Gsm – srsly? presented at 26C3 in Berlin,

22. European Telecommunications Standards Institute, France. Digital cellular