1. Abellán, C., Pruneri, V.: The Future of Cybersecurity is Quantum, Spectrum, 2018(Jul), pp. 31–35, IEEE, 2018.
2. Aftenposten: Sources: We were pressured to weaken the mobile security in the 1980s (2014). https://www.aftenposten.no/verden/i/Olkl/Sources-We-were-pressured-to-weaken-the-mobile-security-in-the-80s. Zugegriffen: 18. Jan. 2021
3. AlFardan, N.J., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.N.: On the Security of RC4 in TLS. In: Proceedings of 22nd USENIX security symposium, Washington, S. 305–320. USENIX Association (2013)
4. Baranetsky, D.V.: Encryption and the press clause. NYU JIPEL 6(2) (2017). http://jipel.law.nyu.edu/vol-6-no-2-1-baranetsky/. Zugegriffen: 18. Jan. 2021
5. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Proceedings of Advances in Cryptology – Crypto ’96. LNCS Bd. 1109. Springer, Berlin (1996)