[1] 姚惠明, 隋爱芬, 杨义先. 3GPP网络AKA协议中若干算法的设计[J]. 北京邮电大学学报, 2002, 25(3): 98-102. Yao Huiming, Sui Aifen, Yang Yixian. Design of some algorithms in AKA protocol of 3GPP network[J]. Journal of Beijing University of Posts and Telecommunications, 2002, 25(3): 98-102.
[2] 沈苏彬. 开放电信业务中的若干技术问题探讨[J]. 北京邮电大学学报, 2004, 27(增刊): 16-24. Shen Subin. Research of some technique issue in opening telecommunication business[J]. Journal of Beijing University of Posts and Telecommunications, 2004, 27(Sup): 16-24.
[3] Schneier B. Applied cryptography second edition: protocols, algorithms, and source code in C[M]. New York: John Wiley & Sons, 1996.
[4] 王育民, 刘建伟. 通信网的安全——理论与技术[M]. 西安: 西安电子科技大学出版社, 1999: 100-101.
[5] Barkan E, Biham E, Keller N. Instant ciphertext-only cryptanalysis of GSM. Haifa: Technion-Computer Science Department Technical Report CS-2003-05, 1-18.
[6] Ekdahl P, Johansson T. Another attack on A5/1[J]. IEEE Transactions on Information Theory, 2003, 49(1): 284-289.
[7] 陈伟, 胡云, 杨义先, 等. 基于相关攻击的A5/1算法识别[J]. 电子与信息学报, 2006, 28(5): 827-831. Chen Wei, Hu Yun, Yang Yixian, et al. Identify of A5/1 algorithm based on correlation attack[J]. Journal of Electronic Information, 2006, 28 (5): 827-831.
[8] Kholosha A. Clock-controlled shift registers for key-stream generation. Netherlands: Technische Universiteit Eindhoven, 2002. |