Andreas Beckmann, Roman Dementiev & Johannes Singler (2009):
Building a parallel pipelined external memory algorithm library.
In: Parallel Distributed Processing – IPDPS 2009.
IEEE,
pp. 1–10,
doi:10.1109/IPDPS.2009.5161001.
Andreas Beckmann & Jörg Keller (2007):
Parallel-External Computation of the Cycle Structure of Invertible Cryptographic Functions.
In: Proc. 15th EUROMICRO Int. Conf. Parallel, Distributed and Network-Based Processing PDP '07,
pp. 526–533,
doi:10.1109/PDP.2007.61.
Eli Biham (1997):
A fast new DES implementation in software.
In: Eli Biham: Fast Software Encryption,
Lecture Notes in Computer Science 1267.
Springer Berlin / Heidelberg,
pp. 260–272,
doi:10.1007/BFb0052352.
Eli Biham & Orr Dunkelman (2000):
Cryptanalysis of the A5/1 GSM Stream Cipher.
In: Bimal Roy & Eiji Okamoto: Progress in Cryptology – INDOCRYPT 2000,
Lecture Notes in Computer Science 1977.
Springer Berlin / Heidelberg,
pp. 43–51,
doi:10.1007/3-540-44495-5_5.
Roman Dementiev, Lutz Kettner & Peter Sanders (2008):
STXXL: standard template library for XXL data sets.
Software: Practice and Experience 38(6),
pp. 589–637,
doi:10.1002/spe.844.
Philippe Flajolet & Andrew Odlyzko (1990):
Random Mapping Statistics.
In: Jean-Jacques Quisquater & Joos Vandewalle: Advances in Cryptology – EUROCRYPT 89,
Lecture Notes in Computer Science 434.
Springer Berlin / Heidelberg,
pp. 329–354,
doi:10.1007/3-540-46885-4_34.
Jovan Dj. Goli\'c (1997):
Cryptanalysis of Alleged A5 Stream Cipher.
In: Walter Fumy: Advances in Cryptology – EUROCRYPT 97,
Lecture Notes in Computer Science 1233.
Springer Berlin / Heidelberg,
pp. 239–255,
doi:10.1007/3-540-69053-0_17.
Wireless Intelligence of GSMA Media LLC (February 1, 2011):
Number of connections by bearer technology Q4 2010.
Received via email.
Jörg Keller (2007):
Efficient Sampling of the Structure of Crypto GeneratorsState Transition Graphs.
In: Andrew Blyth & Iain Sutherland: EC2ND 2006.
Springer London,
pp. 3–12,
doi:10.1007/978-1-84628-750-3_1.
Jörg Keller & Jop Sibeyn (2001):
Beyond External Computing: Analysis of the Cycle Structure of Permutations.
In: Rizos Sakellariou: Euro-Par 2001 Parallel Processing,
Lecture Notes in Computer Science 2150.
Springer Berlin / Heidelberg,
pp. 333–342,
doi:10.1007/3-540-44681-8_48.
Leslie Lamport (1981):
Password authentication with insecure communication.
Commun. ACM 24,
pp. 770–772,
doi:10.1145/358790.358797.
Karsten Nohl & Sascha Krissler:
A5/1 Security Project.
Available at http://reflextor.com/trac/a51.
(accessed January 10, 2012).