Protokoli Kili
THE LÄ°NKS ABOUT GSM Literatura [1] Jeremy Quirke: Security in the GSM system, [2] Bruce Schneir: Applied cryptography, John Wiley & Sons, USA, 1996. [3] Ignac Lovrek: Predavanja iz predmeta Komunikacijski protokoli, Zavod za telekomunikacije, FER, Zagreb [4] Javier Gozalvez Sempere: An overview of the GSM system, [5] John Scourias: Overview of the Global System for Mobile Communications, [6] Charles Brookson: GSM security and encryption, [7] Marc Briceno, Ian Goldberg, and David Wagner: An implementation of the GSM A3A8 algorithm. [8] Limor Elbaz: Using public key cryptography in mobile phones, [9] Tomislav Novosel: Seminarski rad iz Opercijskih sustava 2, A5 algoritam kriptiranja podataka, [10] Dalibor Hrg: Seminarski rad iz Opercijskih sustava 2, RC4, [11] Phillip Rogaway and Don Coppersmith: A Software-Optimized Encryption Algorithm, [12] Bruce Schneir: The Solitaire Encryption Algorithm, [13] Paul Crowley: Problems with Bruce Schneier's 'Solitaire', [14] David J.
Kilimanjaro; kiekeboe; kiddkidd; kickback; kickapoo; kfrhbvjpf; keysersoze. Ptpd6719; ptktyjuhfl; prussian; prunella; prototip; protokol; protecto; prosper1.
Wheeler: A Bulk Data Encryption Algorithm, [15] Tomas Balderas-Contreras, Rene A. Cumplido Parra: An Efficient Hardware Implementation of The KASUMI Block Cipher for Third Generation Cellular Networks, http://ccc.inaoep.mx.