Evolution in Networks and Computer Communications

© 2011 by IJCA Journal

Number 2 - Article 2

Year of Publication: 2011

- G. Rose, A précis of new attacks on GSM encryption, Qualcomm, Australia, 10 september 2003.
- R. Mita, G. Palumbo and M. Poli, Pseudo-random sequence generators with improved inviolability performance, IEE Proceedings of Circuits, Devices and Systems, vol. 153, pp 375-382, 2006.
- J. Golic, Cryptanalysis of alleged A5 stream cipher, Advances in Cryptology, proceedings of EUROCRYPT’97, LNCS, vol. 1233, pp. 239–255, Springer-Verlag, 1997.
- A. Biryukov, A. Shamir, and D. Wagner, Real time cryptanalysis of A5/1 on a PC, Advances in Cryptology, proceedings of Fast Software Encryption’00, LNCS, pp. 1–18, Springer-Verlag, 2001.
- E. Biham, and O. Dunkelman, Cryptanalysis of the A5/1 GSM stream cipher, Progress in Cryptology, proceedings of INDOCRYPT’00, LNCS, pp. 43–51, Springer-Verlag, 2000.
- P. Ekdahl, and T. Johansson, Another attack on A5/1, IEEE Transactions on Information Theory, vol. 49, pp. 284-289, 2003.
- A. Maximov, T. Johansson, and S. Babbage, An improved correlation attack on A5/1, proceedings of SAC 2004, LNCS, vol. 3357, pp. 1–18, Springer-Verlag, 2005.
- E. Barkan, and E. Biham, Conditional estimators: an effective attack on A5/1, proceedings of SAC 2005, LNCS, vol. 3897, pp. 1–19, Springer-Verlag, 2006.
- S. E. AlAschkar and M. T. El-Hadidi, Known attacks for the A5/1 algorithm: a tutorial, International Conference on Information and Communications Technology (ICICT’03), pp. 229-251, 2003.
- B. Schneier, Applied Cryptography, protocols algorithm and souce code in c, Second edition, John Wiley & Sons Inc.
- Andrew Rukhin et all, NIST, A Statistical Test Suit for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 , with revisions dated May 15, 2001.
- Recommendation GSM 02.09, European Telecommunications Standards Institute (ETSI), Security aspects.
- M. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou and C. E. Goutis, Comparison of the hardware architectures and FPGA implementations of stream ciphers, proceedings of the 11th IEEE International Conference on Electronics, Circuits and Systems (ICECS’04), pp. 571- 574, 2004.
- W. Ahmad, O, Farooq and Izharuddin, Stream Ciphering using a novel Pseudo-Random generator, the ICFAI University Journal of Electronics Engineering, vol 1, No.1, 2008.
- A. Braeken, Cryptographic properties of boolean functions and s-boxes, Katholieke Universiteit Leuven, Belgium, Ph.D Thesis, March 2006.