A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
We were forced to weaken the mobile security, Aftenposten. Retrieved from the Internet, pp.2014-2015 ,
Hacking digital phones Retrieved from the Internet 2014-01-14: https://groups.google.com/forum, p.719, 1994. ,
NSA Able To Crack A5 ,
Retrieved from the Internet 2014- 01-14 http ,
Real Time Cryptanalysis of A5/1 on a PC. Fast Software Encryption?FSE, pp.1-18, 2000. ,
Cryptanalysis of Alleged A5 Stream Cipher, 1997. ,
Cryptanalysis of the A5/1 GSM Stream Cipher. Indocrypt, pp.43-51, 2000. ,
Another attack on A5/1, IEEE Transactions on Information Theory, vol.49, issue.1, pp.284-89, 2003. ,
DOI : 10.1109/TIT.2002.806129
Conditional Estimators: An Effective Attack on A5/1. Selected Areas in Cryptography 1?19, 2005. ,
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, pp.600-616, 2003. ,
Trusted Health Information Systems. A project within the DGXIII INFOSEC programme on Electronic signatures and trusted third party services. Final deliverable. Part 1. Requirements on electronic signature services, pp.1-87, 1995. ,
Trusted Health Information Systems. Final deliverable. Part 2. Trusted Third Party Services, pp.1-54, 1995. ,
Trusted Health Information Systems -Management Summary, pp.1-16, 1994. ,
On the existence of a global system for the interception of private and commercial communications (ECHELON interception system)(INI))" (pdf ? 194 pages) European Parliament: Temporary Committee on the ECHELON Interception System, p.2098, 2001. ,