References
- Information Processing-OSI Basic Reference Model - Part 2 : Security Architecture ISO/IEC 7498-2
- Interim Standard 95 Mobile-Base Station Compatibility Standard for Dual-Mode Wideband Spread spectrum Cellular System TIA/EIA IS-95A
- European Digital Cellular Telecommunication System (phase 2) - Security Related Network Functions ETSI
- Personal Communications Services PACS Air Interface Specification JTC
- Crypto '97 Toward realizing Random Oracles : Hash Functions that Hides All Partial Information Ran Canetti
- 1st ACM Comference on Computer and Communications Security Random oracles are practical : a paradigm for designing efficient protocols M. Bellare;J. Kilian;P. Rogaway
- Telecommunication Review v.6 no.2 디지털 이동통신 인증 서비스의 기술동향 이국희;류정수;하재철;문상재
- U.S.A. Patent No. 5153919 Service Provision Authentication Protocol J. A. Reeds Ⅲ;P. A. Treventi
- Contemporary Cryptology : The Science of Information Integrity C. J. Mitchell;K. Piper;P. Will;G. J. Simmons(ed.)
- Requests for Comments (RFC) 1321 The MD5 message digest algorithm R. Rivest
- FIPS PUB 180-1 Secure Hash Standard U.S. Department of Commerce(NIST)
- Fast Software Encryption, LNCS1039 RIPEMD-160 : A strengthened version of RIPEMD H. Dobbertin;A. Bosselaers;B. Preneel
- Auscrypt '92 Abstract HAVAL-A On-way Hashing Algorithm with Variable of Output Y. Zhang;J. Pieprzyk;J. Seberry
- Advances in Cryptology-Eurocrypt '93, LNCS 773 Collision for the compression function of MD5 B. den Boea;A. Bosselaers
- Journal of Cryptology RIPEMD with two-round compression function is not collision free H. Dobbertin
- Cryptography : Policy and Algorithm Keyed Hash Function S. Bakhtiary;R. Safavi-Naini;J. Pieprzky
- WCT '97 워트샵자료집 이동통신을 위한 인증 알고리듬 개발 이국희;정명준;이상곤;문상재;정원영;김태근
- Advances in Cryptology-Crypt '96, LNCS 1109 Fast hashing on the Pentium A. Bosselaers;R. Govaerts;J. Van-dewalls
- proceeding of Eurocrypt '97, LNCS 1233 SHA : a design for parallel architecture A. Bosselaers;R. Govaerts;J. Van-dewalls
- Introduction to Mathematical Statics (4th ed.) Paul G. Hoel
- Cryptography : Policy and Algorithms Randomness Measures Related to Subset Occurrence H. M. Gustafson;E. P. Dawson;J. Dj. Gli
- Tech. rep. 95-09 Cryptographic Hash Functions : A Survey S. Bakhtiari;R. Safavi-Naini;J. Pieprzyk
- in Series of Annual Workshop on Selected Areas in Cryptography (SAC '95) Practical and Secure Message Authentication S. Bakhtiari;R. Safavi-Naini;J. Pieprzyk
- workshop on Selected Areas in Cryptology 1998, Peproceedings Cryptanalysis of ORYX. D. Wagner;L. Simpson;E. Dawson;J. Kelsey;W. Millan;B. Shneier
- Advances in Cryptology-Crypto '97 Proceedings, LNCS 1294 Cryptanalysis of the Cellular Message Encryption Algorithm D. Wagner;B. Schneier;J. Kelsey
- in the 1st International Conference on Information Security and Cryptology, Proceedings Cryptanalysis of the Aleged CAVE Algorithm W. Millan
- New security algorithms : Call for development Telecommuniactions Industry Association
- Dual Mode Cellular System : Authentication, Message Encryption, Voice Privacy Mask Generation, Shared Secret Data generation, A-Key Verification, and Test Data TIA IS-54 Appendix A