References

  1. Andreas Beckmann, Roman Dementiev & Johannes Singler (2009): Building a parallel pipelined external memory algorithm library. In: Parallel Distributed Processing – IPDPS 2009. IEEE, pp. 1–10, doi:10.1109/IPDPS.2009.5161001.
  2. Andreas Beckmann & Jörg Keller (2007): Parallel-External Computation of the Cycle Structure of Invertible Cryptographic Functions. In: Proc. 15th EUROMICRO Int. Conf. Parallel, Distributed and Network-Based Processing PDP '07, pp. 526–533, doi:10.1109/PDP.2007.61.
  3. Eli Biham (1997): A fast new DES implementation in software. In: Eli Biham: Fast Software Encryption, Lecture Notes in Computer Science 1267. Springer Berlin / Heidelberg, pp. 260–272, doi:10.1007/BFb0052352.
  4. Eli Biham & Orr Dunkelman (2000): Cryptanalysis of the A5/1 GSM Stream Cipher. In: Bimal Roy & Eiji Okamoto: Progress in Cryptology – INDOCRYPT 2000, Lecture Notes in Computer Science 1977. Springer Berlin / Heidelberg, pp. 43–51, doi:10.1007/3-540-44495-5_5.
  5. Cryptome.org: GSM A5 Files Published on Cryptome and Elsewhere. Available at http://cryptome.org/0001/gsm-a5-files.htm. (accessed January 10, 2012).
  6. Roman Dementiev, Lutz Kettner & Peter Sanders (2008): STXXL: standard template library for XXL data sets. Software: Practice and Experience 38(6), pp. 589–637, doi:10.1002/spe.844.
  7. Philippe Flajolet & Andrew Odlyzko (1990): Random Mapping Statistics. In: Jean-Jacques Quisquater & Joos Vandewalle: Advances in Cryptology – EUROCRYPT 89, Lecture Notes in Computer Science 434. Springer Berlin / Heidelberg, pp. 329–354, doi:10.1007/3-540-46885-4_34.
  8. Jovan Dj. Goli\'c (1997): Cryptanalysis of Alleged A5 Stream Cipher. In: Walter Fumy: Advances in Cryptology – EUROCRYPT 97, Lecture Notes in Computer Science 1233. Springer Berlin / Heidelberg, pp. 239–255, doi:10.1007/3-540-69053-0_17.
  9. Wireless Intelligence of GSMA Media LLC (February 1, 2011): Number of connections by bearer technology Q4 2010. Received via email.
  10. Jörg Keller (2007): Efficient Sampling of the Structure of Crypto GeneratorsState Transition Graphs. In: Andrew Blyth & Iain Sutherland: EC2ND 2006. Springer London, pp. 3–12, doi:10.1007/978-1-84628-750-3_1.
  11. Jörg Keller & Jop Sibeyn (2001): Beyond External Computing: Analysis of the Cycle Structure of Permutations. In: Rizos Sakellariou: Euro-Par 2001 Parallel Processing, Lecture Notes in Computer Science 2150. Springer Berlin / Heidelberg, pp. 333–342, doi:10.1007/3-540-44681-8_48.
  12. Leslie Lamport (1981): Password authentication with insecure communication. Commun. ACM 24, pp. 770–772, doi:10.1145/358790.358797.
  13. Karsten Nohl & Sascha Krissler: A5/1 Security Project. Available at http://reflextor.com/trac/a51. (accessed January 10, 2012).
  14. NVIDIA: CUDA C Programming Guide. Available at http://developer.download.nvidia.com/compute/DevZone/docs/html/C/doc/CUDA_C_Programming_Guide.pdf.
  15. Jeffrey S. Vitter (2008): Algorithms and Data Structures for External Memory. now Publishers, doi:10.1561/0400000014.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org