id: Гость   вход   регистрация
текущее время 19:46 28/03/2024
создать
просмотр
редакции
ссылки

Использованные материалы


1. Chris Tryhorn. Nice talking to you ... mobile phone use

passes milestone. The Guardian, 2009. Tuesday 3 March
http://www.guardian.co.uk/tech.....ar/03/mobile-phones1 .

2. Ross J. Anderson. Security Engineering: A Guide to Building Dependable

Distributed Systems, chapter 17. Wiley Computer Publishing, 2001. ISBN:
0471389226.

3. February 2010. http://www.ing.nl/particulier/internetbankieren/

internetbankieren/wijzigingen-in-...

4. January 2010. https://svn.berlin.ccc.de/proj.....rprobe/wiki/tracelog

5. Elad Barkan, Eli Biham, and Nathan Keller. Instant ciphertext-only cryptanalysis

of gsm encrypted communication. In Advances in Cryptology – CRYPTO 2003,
volume 2729/2003, pages 600­616. Springer Berlin / Heidelb erg, 2003.

6. Orr Dunkelman, Nathan Keller, and Adi Shamir. A practical-time attack

on the a5/3 cryptosystem used in third generation gsm telephony. 2010.
http://eprint.iacr.org/ .

7. Marc Briceno, Ian Goldb erg, and David Wagner. A pedagogical implementa-

tion of the gsm a5/1 and a5/2 "voice privacy" encryption algorithms, 1999.
http://cryptome.org/gsm-a512.htm (originally on www.scard.org).

8. Jovan Golic. Cryptanalysis of Al leged A5 Stream Cipher, page 23955. 1997.

9. Elad Barkan and Eli Biham. Conditional Estimators: An Effective Attack on A5/1, page 119. 2005.
10. August 2010. http://www.global-security-sol.....com/GSAudioSurv.html .
11. January 2010. http://www.ettus.com/ .
12. Septemb er 2009. http://gnuradio.org/trac .
13. January 2010. https://svn.berlin.ccc.de/projects/airprobe/wiki .
14. January 2010. http://www.reflextor.com/trac/a51 .
15. Steve Muller and David Hulton. The a5 cracking project. In Chaos Communication Camp 2007, 2007.

16. January 2010. http://reflextor.com/torrents/ .
17. Erguler, Imran, Anarim, and Emin. A new cryptanalytic time-memory trade-off for stream ciphers. In Computer and Information Sciences – ISCIS 2005, volume 3733 of Lecture Notes in Computer Science, pages 215­223. Springer Berlin / Heidelberg, 2005.
18. Jin Hong, Kyung Jeong, Eun Kwon, In-Sok Lee, and Daegun Ma. Variants of the

distinguished point method for cryptanalytic time memory trade-offs. In Information Security Practice and Experience, volume 4991 of Lecture Notes in Computer Science, pages 131­145. Springer Berlin / Heidelb erg, 2008.

19. September 2009. http://openbts.sourceforge.net/ .
20. September 2009. http://bs11-abis.gnumonks.org/trac/wiki/OpenBSC .
21. Karsten Nohl and Chris Paget. Gsm – srsly? presented at 26C3 in Berlin,

22. European Telecommunications Standards Institute, France. Digital cellular

telecommunications system (Phase 2);Mobile Station – Base Stations System (MS – BSS) interface Data Link (DL) layer specification, 2010. TS 44.006 v9.1.0.

Назад | Оглавление


 
Комментариев нет [показать комментарии/форму]
Ваша оценка документа [показать результаты]
-3-2-1 0+1+2+3