13.09.2014 Views

vulcan-cryptanalysis

vulcan-cryptanalysis

vulcan-cryptanalysis

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[6] Motorola Encryption Topics,<br />

http://wiki.radioreference.com/index.php/Motorola Encryption Topics<br />

[7] Encryption Protocols: A Brief Look at Analog and Digital Encryption<br />

Devices, http://www.radioreference.com/trunked/stuff/encrypt.html<br />

[8] 2-Way Encryption Primer, http://www.batlabs.com/encrypt.html<br />

[9] KY-57 Vinson Voice Encryption Unit,<br />

http://www.cryptomuseum.com/crypto/usa/ky57/<br />

[10] The Layman’s Guide to IC Reverse Engineering,<br />

http://siliconzoo.org/tutorial.html<br />

[11] Voice Security FAQs, http://www.midians.com/voice-security-faqs<br />

[12] W. Braun, A. Leitich, “Digital Privacy System”, U.S. Patent 3,639,690,<br />

February 1, 1972.<br />

[13] R. Coe, D. McQuade, D. Weiss, “Digital Voice Protection System and<br />

Method”, U.S. Patent 4,167,700, September 11, 1979.<br />

[14] M. Bright, E. Ziolko, A. Wilson, M. Bray, H. Hennen, D. Weiss, “Secure<br />

Communication System”, U.S. Patent 4,893,339, January 9, 1990.<br />

[15] Motorola, Inc., “Securenet”, U.S. Trademark Reg. Num. 1842824, January<br />

1, 1982.<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!