References
- S. H. Babbage, Improved "exhaustive search" attacks on stream ciphers, In European Convention on Security and Detection, IEE Conference Publication (1995), no. 408, 161-166.
- E. P. Barkan, Cryptanalysis of Ciphers and Protocols, Ph.D. Thesis, Technion-Israel Institute of Technology, March 2006.
- E. Barkan, E. Biham, and A. Shamir, Rigorous bounds on cryptanalytic time/memory tradeoffs, In Advances in Cryptology-CRYPTO 2006, 1-21, Lecture Notes in Comput. Sci., 4117, Springer, Berlin, 2006.
- A. Biryukov, S. Mukhopadhyay, and P. Sarkar, Improved time-memory trade-offs with multiple data, In SAC 2005, 110-127, Lecture Notes in Comput. Sci., 3897, Springer, Berlin, 2006.
- A. Biryukov and A. Shamir, Cryptanalytic time/memory/data tradeoffs for stream ciphers, In Advances in Cryptology-ASIACRYPT 2000, 1-13, Lecture Notes in Comput. Sci., 1976, Springer, Berlin, 2000.
- A. Biryukov, A. Shamir, and D. Wagner, Real time cryptanalysis of A5/1 on a PC, In FSE 2000, 1-18, Lecture Notes in Comput. Sci. 1978, Springer, 2001.
- J. Borst, Block Ciphers: Design, Analysis, and Side-Channel Analysis, Ph.D. Thesis, Katholieke Universiteit Leuven, September 2001.
- J. Borst, B. Preneel, and J. Vandewalle, On the time-memory tradeoff betweeen exhaustive key search and table precomputation, In Proceedings of the 19th Symposium on Information Theory in the Benelux, WIC, 1998.
- D. E. Denning, Cryptography and Data Security, Addison-Wesley, 1982.
- J. Dj. Golic, Cryptanalysis of alleged A5 stream cipher, In Advances in Cryptology-EUROCRYPT '97, 239-255, Lecture Notes in Comput. Sci. 1233, Springer, 1997.
- M. E. Hellman, A cryptanalytic time-memory trade-off, IEEE Trans. Inform. Theory 26 (1980), no. 4, 401-406. https://doi.org/10.1109/TIT.1980.1056220
- J. Hong and S. Moon, A comparison of cryptanalytic tradeoff algorithms, J. Cryptology 26 (2013), no. 4, 559-637. https://doi.org/10.1007/s00145-012-9128-3
- B.-I. Kim and J. Hong, Analysis of the non-perfect table fuzzy rainbow tradeoff, In ACISP 2013, 347-362, Lecture Notes in Comput. Sci. 7959, Springer, 2013.
- B.-I. Kim and J. Hong, Analysis of the perfect table fuzzy rainbow tradeoff, J. Appl. Math. 2014 (2014), Article ID 765394.
- G. W. Lee and J. Hong, A comparison of perfect table cryptanalytic tradeoff algorithms, Des. Codes Cryptogr. 80 (2016), no. 3, 473-523. https://doi.org/10.1007/s10623-015-0116-0
- K. Nohl, Attacking phone privacy, Presented at Black Hat USA 2010, Las Vegas, July 2010.
- K. Nohl and C. Paget, GSM-SRSLY?, Presented at 26th Chaos Communication Congress (26C3), Berlin, December 2009.
- P. Oechslin, Making a faster cryptanalytic time-memory trade-off, In Advances in Cryptology-CRYPTO 2003, 617-630, Lecture Notes in Comput. Sci., 2729, Springer, Berlin, 2003.