1. Briceno, M., Goldberg, I., Wagner, D.: A Pedagogical Implementation of A5/1, http://jya.com/a51-pi.htm
2. Briceno, M., GoldBerg, I., Wagner, D.: A Pedagogical Implementation of the GSM A5/1 and A5/2 voice privacy encryption algorithms, http://www.scard.org.gsm/a51.html
3. Ravi Chandra, N.: Cryptanalysis of Security Algorithms in CDMA, http://www.csa.iisc .ernet.in/ academics/projects/
4. Lecture Notes in Computer Science;D. Wager,1999
5. Canniere, C., Johansson, T., Preneel, B.: Cryptanalysis of the Bluetooth Stream Cipher, http://www.esat.kuleuven.ac.be/~cosicart/ps/CDC-0101.ps.gz