@inproceedings{a8b958298f0d462c90e25f3d9157258b,
title = "Analysis of IS-95 CDMA voice privacy",
abstract = "The voice privacy of IS-95 CDMA cellular systemis analyzed in this paper. By exploiting information redundancy on the downlink traffic channel, it is shown that an eavesdropper can recover the voice privacy mask after eavesdropping the transmission on the downlink traffic channel for about one second. Thus, IS-95 CDMA voice privacy is vulnerable under ciphertext-only attacks.",
author = "Muxiang Zhang and Christopher Carroll and Agnes Chan",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 2001. Copyright: Copyright 2020 Elsevier B.V., All rights reserved.; 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000 ; Conference date: 14-08-2000 Through 15-08-2000",
year = "2001",
doi = "10.1007/3-540-44983-3_1",
language = "English (US)",
isbn = "354042069X",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "1--13",
editor = "Stinson, {Douglas R.} and Stafford Tavares",
booktitle = "Selected Areas in Cryptography - 7th Annual International Workshop, SAC 2000, Proceedings",
}