A5/1 (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "A5/1" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
low place
low place
1,518th place
1,072nd place
5,701st place
4,384th place
1,779th place
2,122nd place
low place
low place
5,165th place
3,393rd place
low place
low place
low place
low place
low place
low place
11th place
8th place
low place
low place
low place
low place
7th place
7th place
1,317th place
873rd place
low place
low place
34th place
27th place
6th place
6th place

aftenposten.no

archive.org

ausmobile.com

  • Quirke, Jeremy (1 May 2004). "Security in the GSM system" (PDF). AusMobile. Archived from the original (PDF) on 12 July 2004. Retrieved 8 September 2008.

ccc.de

events.ccc.de

  • Nohl, Karsten; Chris Paget (27 December 2009). GSM: SRSLY?. 26th Chaos Communication Congress (26C3). Archived from the original on 6 January 2010. Retrieved 30 December 2009.

crypto.com

doi.org

groups.google.com

har2009.org

  • "Archived copy" (PDF). Archived from the original (PDF) on 26 July 2011. Retrieved 29 December 2009.{{cite web}}: CS1 maint: archived copy as title (link) Subverting the security base of GSM. Karsten Nohl and Sascha Krißler

lth.se

it.lth.se

nytimes.com

pcworld.com

reflextor.com

lists.lists.reflextor.com

sciengines.com

semanticscholar.org

api.semanticscholar.org

slashdot.org

yro.slashdot.org

technion.ac.il

cs.technion.ac.il

uconn.edu

saluc.engr.uconn.edu

washingtonpost.com

web.archive.org

  • Quirke, Jeremy (1 May 2004). "Security in the GSM system" (PDF). AusMobile. Archived from the original (PDF) on 12 July 2004. Retrieved 8 September 2008.
  • Golić, Jovan Dj. (1997). "Cryptanalysis of Alleged A5 Stream Cipher" (PDF). Eurocrypt 1997. Lecture Notes in Computer Science. Vol. 1233. pp. 239–55. doi:10.1007/3-540-69053-0_17. ISBN 978-3-540-62975-7. Archived from the original (PDF) on 15 July 2010. Retrieved 13 January 2016.
  • Ekdahl, Patrik; Thomas Johansson (2003). "Another attack on A5/1" (PDF). IEEE Transactions on Information Theory. 49 (1): 284–89. doi:10.1109/TIT.2002.806129. Archived from the original (PDF) on 25 May 2005.
  • Barkan, Elad; Eli Biham; Nathan Keller. "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication by Barkan and Biham of Technion (Full Version)" (PDF). Archived from the original (PDF) on 25 January 2020. Retrieved 15 September 2019.
  • Nohl, Karsten; Chris Paget (27 December 2009). GSM: SRSLY?. 26th Chaos Communication Congress (26C3). Archived from the original on 6 January 2010. Retrieved 30 December 2009.
  • "Archived copy" (PDF). Archived from the original (PDF) on 26 July 2011. Retrieved 29 December 2009.{{cite web}}: CS1 maint: archived copy as title (link) Subverting the security base of GSM. Karsten Nohl and Sascha Krißler
  • O'Brien, Kevin (28 December 2009). "Cellphone Encryption Code Is Divulged". New York Times. Archived from the original on 29 April 2011. Retrieved 29 December 2009.
  • McMillan, Robert. "Hackers Show It's Easy to Snoop on a GSM Call". IDG News Service. Archived from the original on 20 January 2012. Retrieved 29 December 2009.
  • Frank A. Stevenson (1 May 2010). "Cracks beginning to show in A5/1". Archived from the original on 6 March 2012.