The 3rd Generation Partnership Project (3GPP),
http://www.3gpp.org/
Biham, E., Dunkelman, O.: Cryptanalysis of the A5/1 GSM Stream Cipher. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 43–51. Springer, Heidelberg (2000)
Google Scholar
Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
CrossRef
Google Scholar
Biryukov, A., Shamir, A., Wagner, D.: Real Time Cryptanalysis of A5/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 1–18. Springer, Heidelberg (2001)
CrossRef
Google Scholar
M. Briceno, I. Goldberg, D. Wagner, A pedagogical implementation of the GSM A5/1 and A5/2 voice privacy encryption algorithms, (1999),
http://cryptome.org/gsm-a512.htm
, originally on
www.scard.org
Briceno, M., Goldberg, I., Wagner, D.: An implementation of the GSM A3A8 algorithm (1998),
http://www.iol.ie/~kooltek/a3a8.txt
Briceno, M., Goldberg, I., Wagner, D.: GSM Cloning (1998),
http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html
Courtois, N.: Higher Order Correlation Attacks,XL Algorithm and Cryptanalysis of Toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 182–199. Springer, Heidelberg (2003)
CrossRef
Google Scholar
Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392–407. Springer, Heidelberg (2000)
CrossRef
Google Scholar
Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267–287. Springer, Heidelberg (2002)
CrossRef
Google Scholar
Ekdahl, P., Johansson, T.: Another Attack on A5/1, to be published in IEEE Transactions on Information Theory (2002),
http://www.it.lth.se/patrik/publications.html
European Telecommunications Standards Institute (ETSI), Digital cellular telecommunications system (Phase 2+); Security related network functions, TS 100 929 (GSM 03.20),
http://www.etsi.org
Goldberg, I., Wagner, D., Green, L.: The (Real-Time) Cryptanalysis of A5/2, presented at the Rump Session of Crypto 1999 (1999)
Google Scholar
Golic, J.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239–255. Springer, Heidelberg (1997)
Google Scholar
Kipnis, A., Shamir, A.: Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19–30. Springer, Heidelberg (1999)
Google Scholar
Security Algorithms Group of Experts (SAGE), Report on the specification and evaluation of the GSM cipher algorithm A5/2 (1996),
http://cryptome.org/espy/ETR278e01p.pdf
Petrović, S., Fúster-Sabater, A.: Cryptanalysis of the A5/2 Algorithm, Cryptology ePrint Archive, Report 2000/052 (2000),
http://eprint.iacr.org