Location:
Search - gsm encryption
Search list
Description: ip电话软件speakfs 7.6a版本,GSM, ADPCM, LPC, and LPC-10压缩和多种加密算法 -speakfs ip phone software version 7.6a, GSM, ADPCM, LPC, and LPC-10 compression and multiple encryption algorithm
Platform: |
Size: 1570219 |
Author: 文心 |
Hits:
Description: 完整的GSM信道编码 为话音信道的卷积编译码 还有交织-integrity of the GSM channel coding for voice channel convolution encryption also intertwined
Platform: |
Size: 34702 |
Author: gs |
Hits:
Description: MATLBA 信道仿真,完成信道卷积码循环码的编译码-MATLBA channel simulation complete Channel Convolutional Codes cycle code encryption
Platform: |
Size: 797260 |
Author: 李丽 |
Hits:
Description: 用于GSM加密的A5算法实现- Uses in GSM the encryption A5 algorithm to realize
Platform: |
Size: 6144 |
Author: 站长 |
Hits:
Description: ip电话软件speakfs 7.2版本,GSM, ADPCM, LPC, and LPC-10压缩和多种加密算法-ip phone software speakfs 7.2 version, GSM, ADPCM, LPC, and LPC-10 compression and a variety of encryption algorithm
Platform: |
Size: 1116160 |
Author: |
Hits:
Description: ip电话软件speakfs 7.6a版本,GSM, ADPCM, LPC, and LPC-10压缩和多种加密算法 -speakfs ip phone software version 7.6a, GSM, ADPCM, LPC, and LPC-10 compression and multiple encryption algorithm
Platform: |
Size: 1569792 |
Author: 文心 |
Hits:
Description: 完整的GSM信道编码 为话音信道的卷积编译码 还有交织-integrity of the GSM channel coding for voice channel convolution encryption also intertwined
Platform: |
Size: 34816 |
Author: gs |
Hits:
Description: MATLBA 信道仿真,完成信道卷积码循环码的编译码-MATLBA channel simulation complete Channel Convolutional Codes cycle code encryption
Platform: |
Size: 796672 |
Author: 李丽 |
Hits:
Description: 手机加密通话软件,通过GSM网络的CSD信道传输数据,与VOIP不同,无须后台就可以实现点对点呼叫-Phone call encryption software, the CSD through the GSM network to transmit data channel, with different VOIP without the background can be achieved point-to-point call
Platform: |
Size: 1908736 |
Author: lucifer |
Hits:
Description: gsm系统中话音加密技术的研究,gsm系统中话音加密技术的研究-gsm voice encryption systems research, gsm voice encryption systems research
Platform: |
Size: 79872 |
Author: 骆伯萍 |
Hits:
Description: GSM加密手机系统的安全性设计研究,研究gsm的好资料。-GSM phone encryption system security design studies gsm good information.
Platform: |
Size: 791552 |
Author: dly252 |
Hits:
Description: 可以將聲音由麥克風取得壓縮後用RTP送出。可以使用PCM GSM。使用簡單方便,也可以在裡面加上加密解密。-Voice can be compressed by a microphone made out with RTP. Can use the PCM GSM. The use of simple and convenient, can also be combined with encryption and decryption on the inside.
Platform: |
Size: 1189888 |
Author: dearw |
Hits:
Description: Cracking GSM A5 encryption
Platform: |
Size: 844800 |
Author: greg |
Hits:
Description: cracking gsm A5 encryption
Platform: |
Size: 844800 |
Author: greg |
Hits:
Description: gsm A5 encryption cracking
Platform: |
Size: 844800 |
Author: greg |
Hits:
Description: integrity of the GSM channel coding for voice channel convolution encryption also intertwined
Platform: |
Size: 34816 |
Author: cyberra2n |
Hits:
Description: A5算法是一种序列密码,它是欧洲GSM标准中规定的加密算法,用于数字蜂窝移动电话的加密,加密从用户设备到基站之间的链路。A5算法包括很多种,主要为A5/1和A5/2。其中,A5/1为强加密算法,适用于欧洲地区;A5/2为弱加密算法,适用于欧洲以外的地区。-The GSM encryption algorithm, A5, is not much good. Its effective key length
is at most five bytes and anyone with the time and energy to look for faster
attacks can find source code for it at the bottom of this post.
The politics of all this is bizarre. Readers may recall that there was a fuss
last year about whether GSM phones could be exported to the Middle East the
official line then was that A5 was too good for the likes of Saddam Hussein.
Platform: |
Size: 2048 |
Author: vince |
Hits:
Description: GSM移动通信系统中的A3A8加密算法代码实现-A3A8 encryption algorithm code to achieve in the GSM mobile communication system
Platform: |
Size: 2048 |
Author: linyang |
Hits:
Description: GSM加密标准A5算法C语言实现,程序仅供参考-GSM encryption algorithm A5 standard C language, the program is only for reference
Platform: |
Size: 1024 |
Author: WANG |
Hits:
Description: a paper about GSM. The cell tower and phone negotiate the highest level of crypto that both mutually support.
During call setup a handset sends a packet that states its crypto level and the tower will return a signal with what is
actually going to be used. Devices that intercept GSM clear-data simulate a tower and proxy the data to the real
tower. They drop the 'I support crypto' packet from the handset so the tower thinks that the handset does not support
any type of encryption and transmits the call in the clear.
Platform: |
Size: 16384 |
Author: aliaskari
|
Hits: