Formal verification proving the security of ZRTP DH mode | The ZRTP Protocol - Analysis of the Diffie-Hellman mode | Riccardo Bresciani Trinity College, Dublin, Ireland |
An evaluation of ZRTP protocol showing resistance to most cryptographic attacks | ZRTP Protocol - Security Considerations | Riccardo Bresciani Ecole Normale Superiore De Cachan, France |
Independent forensics analysis on how ZRTP secure voice communications | Forensics Analysis of zFone and ZRTP | Detica, Information Intelligence London, UK |
Coverage of possible attack scenarios if authentication is not properly managed | Security and Usability Aspects of Man-In-The-Middle attacks in ZRTP | Telecommunication Research Group University of Vienna, Austria |
Research by Nokia showing how to apply ZRTP for securing Mobile communications | Peer to Peer Security for Mobile Real-Time Communications with ZRTP | Nokia Research Center, Finland |
Analysis on the residual performance impact on using VoIP with signaling and voice encryption | VoIP Networks Performance Analysis with Encryption Systems | GISSIC Investigation Group, Military University Nueva Granada, Bogotà, Colombia |
A lot of useful information about ZRTP, it's feature and how it does compare with other security protocols. | zFone FAQ | Philip Zimmermann, San Francisco, USA |
An in depth overview of major Voice Encryption protocols including ZRTP | Major Voice Security protocol Review | Fabio Pietrosanti, Milan, Italy |
Early papers showing zFone capabilities in encrypting voice communications with ZRTP protocol | zFone: A new approach for securing voice communications | Samuel Sotillo, East Carolina University, USA |
Early papers evaluating different weakness in VoIP protocols, explaining various risk mitigations with ZRTP prptocol | Information Security Issues in Voice over Internet Protocol | Jonathan Clark, School of Electrical Engineering, Georgia Institute of Technology, USA |