[1] |
何元智 . 军民融合重大举措—天通一号卫星移动通信系统[C]// 2016中国卫星应用大会. 2016.
|
|
HE Y Z , . A Milestone of civil-military integrated satellite communication:tiantong-01 system[C]// China Satellite Conference 2016. 2016.
|
[2] |
2016中国卫星应用若干重大进展[J]. 卫星应用, 2017(1): 32-39.
|
|
Significant progress in Chinese satellite applications in 2016[J]. Satellite Application, 2017(1): 32-39
|
[3] |
李磊 . 移动通信GSM中密码算法安全性研究[D]. 郑州:解放军信息工程大学, 2012.
|
|
LI L . Research on security of cryptographic algorithm in GSM[D]. Zhengzhou:PLA Information Engineering University, 2012.
|
[4] |
关杰, 丁林, 刘树凯 . SNOW 3G与ZUC流密码的猜测决定攻击[J]. 软件学报, 2013(6): 1324-1333.
|
|
GUAN J , DING L , LIU S K . Guess and determine attack on SNOW 3G and ZUC[J]. Journal of Software, 2013(6): 1324-1333.
|
[5] |
吴泳钢, 古天龙, 徐周波 . SNOW 3G加密算法的BDD攻击[J]. 桂林电子科技大学学报, 2016,36(3): 199-203.
|
|
WU Y G , GU T L , XU Z B . BDD attack on SNOW 3G encryption algorithm[J]. Journal of Guilin University of Electronic Technology, 2016,36(3): 199-203.
|
[6] |
BARKAN P , BIHAM E , KELLER N . Instant cipher-text only cryptanalysis of GSM encrypted communication[J]. Journal of Cryptology, 2008,21(3): 392-429.
|
[7] |
BIRYUKOV A , SHAMIR A , WAGNER D . Real time cryptanalysis of A5/1 on a PC[M]// Fast Software Encryption,Springer Berlin Heidelberg, 2000: 1-18.
|
[8] |
DUNKELMAN O , KELLER N , SHAMIR A . A practical-time attack on the A5/3 cryptosystem used in third generation GSM telephony[C]// Icar Crgptology Eprint Archive. 2010: 393-410.
|
[9] |
WU H , HUANG T , NGUYEN P ,et al. Differential attacks against stream cipher ZUC[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2012: 262-277.
|
[10] |
ZHANG B , XU C , MEIER W . Fast correlation attacks over extension fields,large-unit linear approximation and cryptanalysis of SNOW 2.0[C]// Cryptology Conference. 2015: 643-662.
|
[11] |
ZHOU C , FENG X , LIN D . The Initialization stage analysis of ZUC v1.5[C]// Cryptology and Network Security. 2011: 40-53.
|
[12] |
DRIESSEN B , HUND R , WILLEMS C ,et al. Don't trust satellite phones:a security analysis of two satphone standards[C]// Security and Privacy (SP). 2012: 128-142.
|
[13] |
DRIESSEN B , HUND R , WILLEMS C ,et al. An experimental security analysis of two satphone standards[J]. ACM Transactions on Information & System Security, 2013,16(3): 1-30.
|
[14] |
LI R , LI H , LI C ,et al. A low data complexity attack on the GMR-2 Cipher Used in the Satellite Phones[C]// FSE. 2013: 485-501.
|