1. Lecture Notes in Computer Science;D. Agrawal,2003
2. Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: Second Usenix Workshop on Electronic Commerce, November 1996, pp. 1–11 (1996)
3. Briceno, M., Goldberg, I., Wagner, D.: An Implementation of the GSM A3A8 algorithm (1998), http://www.scard.org/gsm/a3a8.txt
4. Briceno, M., Goldberg, I., Wagner, D.: GSM cloning (1998), http://www.isaac.cs.berkely.edu/isaac/gsm–faq.html
5. Lecture Notes in Computer Science;C. Clavier,2000