1. Conditional estimators: An effective attack on A5/1;Barkan,2006
2. Real time cryptanalysis of A5/1 on a PC;Biryukov,2000
3. Another attack on A5/1;Ekdahl;IEEE Trans. Inf. Theory,2003
4. A5/1 security project, creating A5/1 rainbow tables,2009
5. New applications of time memory data tradeoffs;Hong,2005