{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:58:25Z","timestamp":1725796705347},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319083438"},{"type":"electronic","value":"9783319083445"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08344-5_28","type":"book-chapter","created":{"date-parts":[[2014,7,4]],"date-time":"2014-07-04T10:38:15Z","timestamp":1404470295000},"page":"422-429","source":"Crossref","is-referenced-by-count":1,"title":["Route 66: Passively Breaking All GSM Channels"],"prefix":"10.1007","author":[{"given":"Philip S.","family":"Vejre","sequence":"first","affiliation":[]},{"given":"Andrey","family":"Bogdanov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Association, G.: Brief History of GSM and the GSMA (May 5, 2011), \n                    \n                      gsmworld.com\n                    \n                    \n                  , \n                    \n                      http:\/\/www.webcitation.org\/5yRQRGPgH"},{"key":"28_CR2","unstructured":"ETSI: Digital cellular telecommunications system (Phase 2+); Channel coding (GSM 05.03). Technical report, ETSI (1999)"},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s00145-007-9001-y","volume":"21","author":"E. Barkan","year":"2008","unstructured":"Barkan, E., Biham, E., Keller, N.: Instant Ciphertex-Only Cryptanalysis of GSM Encrypted Communication. Journal of Cryptology\u00a021, 392\u2013429 (2008)","journal-title":"Journal of Cryptology"},{"key":"28_CR4","unstructured":"Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of the GSM A5\/1 and A5\/2 \u2018voice privacy\u2019 encryption algorithms (1999), \n                    \n                      http:\/\/cryptome.org\/gsm-a512.htm"},{"key":"28_CR5","unstructured":"Goldberg, I., Wagner, D., Green, L.: The (Real-Time) Cryptanalysis of A5\/2. Presented at the Rump Session of Crypto 1999 (1999)"},{"key":"28_CR6","unstructured":"Petrovic, S., Fster-Sabater, A.: Cryptanalysis of the A5\/2 Algorithm. Cryptology ePrint Archive, Report 2000\/052 (2000), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/978-3-540-45146-4_35","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"E. Barkan","year":"2003","unstructured":"Barkan, E., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 600\u2013616. Springer, Heidelberg (2003)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J.D.. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 239\u2013255. Springer, Heidelberg (1997)"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11693383_1","volume-title":"Selected Areas in Cryptography","author":"E. Barkan","year":"2006","unstructured":"Barkan, E., Biham, E.: Conditional Estimators: An Effective Attack on A5\/1. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 1\u201319. Springer, Heidelberg (2006)"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11693383_1","volume-title":"Selected Areas in Cryptography","author":"E. Biham","year":"2006","unstructured":"Biham, E., Dunkelman, O.: Cryptanalysis of the A5\/1 GSM Stream Cipher. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 1\u201319. Springer, Heidelberg (2006)"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44706-7_1","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A., Wagner, D.: Real Time Cryptanalysis of A5\/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, p. 1. Springer, Heidelberg (2001)"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-642-14623-7_21","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"O. Dunkelman","year":"2010","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: A Practical-time Related-key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 393\u2013410. Springer, Heidelberg (2010)"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/978-3-540-74735-2_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Eisenbarth, T., Rupp, A.: A Hardware-Assisted Realtime Attack on A5\/2 Without Precomputations. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 394\u2013412. Springer, Heidelberg (2007)"},{"key":"28_CR14","unstructured":"Albrecht, M.R., Pernet, C.: Efficient Dense Gaussian Elimination over the Finite Field with Two Elements. arXiv:1111.6549v1 (November 2011)"},{"key":"28_CR15","unstructured":"ETSI: Digital cellular telecommunications system (Phase 2+); Security related network functions (GSM 03.20). Technical report, ETSI (1998)"},{"key":"28_CR16","unstructured":"ETSI: Digital cellular telecommunications system (Phase 2+); Physical layer on the radio path; General description (GSM 05.01). Technical report, ETSI (1997)"},{"key":"28_CR17","unstructured":"ETSI: Digital cellular telecommunications system (Phase 2+); Mobile radio interface layer 3 specification (GSM 04.08). Technical report, ETSI (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08344-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T06:28:38Z","timestamp":1558938518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08344-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319083438","9783319083445"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08344-5_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}