1. Briceno M, Goldberg I, Wagner D. A pedagogical implementation of A5/1. https://cryptome.org/jya/a51-pi.htm#PI. Accessed 15 July 2021 1999.
2. Fontaine C. E0 (Bluetooth). In: van Tilborg H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA, 2005. https://doi.org/10.1007/0-387-23483-7_117. Accessed 31 Aug 2021.
3. The 3rd Generation Partnership Project (3GPP), TS 35.216: specification of the 3GPP confidentiality and integrity algorithms UEA2 & UIA2; Document 2: SNOW 3G specification (Vol. 10.0.0). 2011. https://www.etsi.org/deliver/etsi_ts/135200_135299/135216/10.00.00_60/ts_135216v100000p.pdf. Accessed 15 Jul 2021.
4. The 3rd Generation Partnership Project (3GPP), TS 35.222: specification of the 3GPP confidentiality and integrity algorithms EEA3 & EIA3; Document 2: ZUC specification (Vol. 11.0.1). 2012. http://www.etsi.org/deliver/etsi_ts/135200_135299/135222/11.0-0.01_60/ts_135222v110001p.pdf. Accessed 15 Jul 2021.
5. The 3rd Generation Partnership Project (3GPP), TS 35.202: specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification (Vol. 10.0.0). 2011. http://www.etsi.org/deliver/etsi_ts/135200_135299/135202/10.0-0.00_60/ts_135202v100000p.pdf. Accessed 15 Jul 2021.