{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:08:07Z","timestamp":1763467687787,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/pimrc.2004.1368846","type":"proceedings-article","created":{"date-parts":[[2005,1,12]],"date-time":"2005-01-12T19:16:46Z","timestamp":1105557406000},"page":"2876-2883","source":"Crossref","is-referenced-by-count":35,"title":["On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM\/UMTS networks"],"prefix":"10.1109","author":[{"given":"U.","family":"Meyer","sequence":"first","affiliation":[]},{"given":"S.","family":"Wetzel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"43","article-title":"Cryptanalysis of the A5\/1 gsm stream cipher","author":"biham","year":"2000","journal-title":"Progress in Cyptoloty proceedings of Indocrypt &#x201C;00 LNCS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.806129"},{"key":"ref12","article-title":"The (real-time) cryptoanalysis of A5\/2","author":"goldberg","year":"1999","journal-title":"Presented at the Rump Session of Crypto&#x2019; 99"},{"key":"ref13","article-title":"Cryptanalysis of the A5\/2 algorithm","author":"petrovic","year":"2000","journal-title":"Cryptology ePrint Archive Report 200\/052"},{"key":"ref14","article-title":"Secure handover procedures","author":"meyer","year":"2003","journal-title":"Proceedings of the 8th Conference on Cellular and Intelligent Communications"},{"journal-title":"ETSI TS 100 929 V8 0 0 Digital Cellular Telecommunications System (phase 2+)(GSM) Security related network functions","article-title":"ETSI Technical Specification","year":"2000","key":"ref4"},{"key":"ref3","article-title":"Der IMSI-catcher","author":"fox","year":"2002","journal-title":"Datenschutz und Datensicherheit - DuD"},{"journal-title":"3GPP TS 35 202 V5 0 0 Third Generation Partnership Project Technical Specification Group 3G Security specification of the 3GPP confidentiality and integrity algorithms document 2 Kasumi algorithm specification","article-title":"3GPP Technical Specification","year":"2002","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"ref8","first-page":"239","article-title":"Cryptanalysis of alleged A5 stream cipher","volume":"1233","author":"golic","year":"0","journal-title":"Advances in Cryptology"},{"journal-title":"A pedagogical implementation of the gsm A5\/1 and A5\/2 &#x201C;voice privacy&#x201D; encryption algorithms","year":"1999","author":"briceno","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1007\/978-3-540-45146-4_35","article-title":"Instant ciphertext-only cryptanalysis of GSM encrypted communication","volume":"2729","author":"barkan","year":"2003","journal-title":"Advances in Cryptology - CRYPTO 2003"},{"journal-title":"3GPP TS 33 102 V5 3 0 Third Generation Partnership Project Technical Specifications Group Services and System Aspects 3G Security Security Architecture","article-title":"3GPP Technical Specification","year":"2003","key":"ref1"},{"key":"ref9","first-page":"1","article-title":"Real time cryptanalysis of A5\/1 on a pc","volume":"1978","author":"biryukov","year":"2001","journal-title":"Advances in Cryptology proceedings of Fast Software Encryption '00"}],"event":{"name":"2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications","acronym":"PIMRC-04","location":"Barcelona, Spain"},"container-title":["2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9435\/29952\/01368846.pdf?arnumber=1368846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T14:51:52Z","timestamp":1497624712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1368846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2004.1368846","relation":{},"subject":[]}}