R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

A. Faeraas, We were forced to weaken the mobile security, Aftenposten. Retrieved from the Internet, pp.2014-2015

R. Anderson, Hacking digital phones Retrieved from the Internet 2014-01-14: https://groups.google.com/forum, p.719, 1994.

S. Jones, NSA Able To Crack A5

C. Crypto, Retrieved from the Internet 2014- 01-14 http

A. Biryukov, A. Shamir, and D. Wagner, Real Time Cryptanalysis of A5/1 on a PC. Fast Software Encryption?FSE, pp.1-18, 2000.

J. D. Golic, Cryptanalysis of Alleged A5 Stream Cipher, 1997.

E. Biham and O. Dunkelman, Cryptanalysis of the A5/1 GSM Stream Cipher. Indocrypt, pp.43-51, 2000.

P. Ekdahl and T. Johansson, Another attack on A5/1, IEEE Transactions on Information Theory, vol.49, issue.1, pp.284-89, 2003.
DOI : 10.1109/TIT.2002.806129

E. Barkan and E. Biham, Conditional Estimators: An Effective Attack on A5/1. Selected Areas in Cryptography 1?19, 2005.

E. Barkan, E. Birham, and N. Keller, Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, pp.600-616, 2003.

G. O. Klein, Trusted Health Information Systems. A project within the DGXIII INFOSEC programme on Electronic signatures and trusted third party services. Final deliverable. Part 1. Requirements on electronic signature services, pp.1-87, 1995.

G. O. Klein, Trusted Health Information Systems. Final deliverable. Part 2. Trusted Third Party Services, pp.1-54, 1995.

G. Klein, Trusted Health Information Systems -Management Summary, pp.1-16, 1994.

G. Schmid, On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)(INI))" (pdf ? 194 pages) European Parliament: Temporary Committee on the ECHELON Interception System, p.2098, 2001.