Andreas Beckmann
Roman Dementiev
Johannes Singler
2009
Building a parallel pipelined external memory algorithm library
Parallel Distributed Processing – IPDPS 2009
IEEE
1–10
10.1109/IPDPS.2009.5161001
Andreas Beckmann
Jörg Keller
2007
Parallel-External Computation of the Cycle Structure of Invertible Cryptographic Functions
Proc. 15th EUROMICRO Int. Conf. Parallel, Distributed and Network-Based Processing PDP '07
526–533
10.1109/PDP.2007.61
Eli Biham
1997
A fast new DES implementation in software
Eli Biham
Fast Software Encryption
Lecture Notes in Computer Science
1267
Springer Berlin / Heidelberg
260–272
10.1007/BFb0052352
Eli Biham
Orr Dunkelman
2000
Cryptanalysis of the A5/1 GSM Stream Cipher
Bimal Roy
Eiji Okamoto
Progress in Cryptology – INDOCRYPT 2000
Lecture Notes in Computer Science
1977
Springer Berlin / Heidelberg
43–51
10.1007/3-540-44495-5_5
Cryptome.org
GSM A5 Files Published on Cryptome and Elsewhere
http://cryptome.org/0001/gsm-a5-files.htm
(accessed January 10, 2012)
Roman Dementiev
Lutz Kettner
Peter Sanders
2008
STXXL: standard template library for XXL data sets
Software: Practice and Experience
38
6
589–637
10.1002/spe.844
Philippe Flajolet
Andrew Odlyzko
1990
Random Mapping Statistics
Jean-Jacques Quisquater
Joos Vandewalle
Advances in Cryptology – EUROCRYPT 89
Lecture Notes in Computer Science
434
Springer Berlin / Heidelberg
329–354
10.1007/3-540-46885-4_34
Jovan Dj. Goli\'c
1997
Cryptanalysis of Alleged A5 Stream Cipher
Walter Fumy
Advances in Cryptology – EUROCRYPT 97
Lecture Notes in Computer Science
1233
Springer Berlin / Heidelberg
239–255
10.1007/3-540-69053-0_17
Wireless Intelligence of GSMA Media LLC
February 1, 2011
Number of connections by bearer technology Q4 2010
Received via email
Jörg Keller
2007
Efficient Sampling of the Structure of Crypto GeneratorsState Transition Graphs
Andrew Blyth
Iain Sutherland
EC2ND 2006
Springer London
3–12
10.1007/978-1-84628-750-3_1
Jörg Keller
Jop Sibeyn
2001
Beyond External Computing: Analysis of the Cycle Structure of Permutations
Rizos Sakellariou
Euro-Par 2001 Parallel Processing
Lecture Notes in Computer Science
2150
Springer Berlin / Heidelberg
333–342
10.1007/3-540-44681-8_48
Leslie Lamport
1981
Password authentication with insecure communication
Commun. ACM
24
770–772
10.1145/358790.358797
Karsten Nohl
Sascha Krissler
A5/1 Security Project
http://reflextor.com/trac/a51
(accessed January 10, 2012)
NVIDIA
CUDA C Programming Guide
http://developer.download.nvidia.com/compute/DevZone/docs/html/C/doc/CUDA_C_Programming_Guide.pdf
Jeffrey S. Vitter
2008
Algorithms and Data Structures for External Memory
now Publishers
10.1561/0400000014