Abstract of "Security Algorithms for Mobile Telephony"
Quick overview of cryptography in GSM and 3G — where it fits in
A bit of context, particularly historical and political, about the development of GSM security … and how things have changed
Some "real life" comments about COMP128, A5/1, A5/2 etc — what I believe the effects of the cryptanalysis are in practice
The development of new algorithms for 3G — part crypto theory, part case study of algorithm development for a real life industry application
Note: Subject to change!