Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Avoine G., Junod P., Oechslin P., “Characterization and improvement of time-memory trade-off based on perfect tables”, Trans. Inf. Syst. Secur., 11:17 (2008), 1–17
[2] Borst J., Preneel B., Vandewalle J., “On the time-memory tradeoff between exhaustive key search and table precomputation”, Symp. Inf. Theory in the Benelux, 1998, 111–118
[3] Hellman M. E., “A cryptanalytic time-memory trade off”, IEEE Trans. Inf. Theory, IT-26 (1980), 401–406 | DOI | MR | Zbl
[4] Hong J., “The cost of false alarms in Hellman and rainbow tradeoffs”, Des., Codes and Cryptogr., 57:3 (2010), 293–327 | DOI | MR | Zbl
[5] Oechslin P., “Making a faster cryptanalytic time-memory trade-off”, CRYPTO'03, Lect. Notes Comput. Sci., 2729, 2003, 617–630 | DOI | MR | Zbl
[6] Standaert F. X., Rouvroy G., Quisquater J. J., Legat J. D., “A time-memory tradeoff using distinguished points: New analysis FPGA results”, CHES 2002, Lect. Notes Comput. Sci., 2523, 2002, 593–609 | DOI | Zbl
[7] Hoch Y. Z., Security analysis of generic iterated hash functions, Ph.D. Thesis, Weizmann Inst. of Sci., 2009 | MR
[8] Hong J., Moon S., “A comparison of cryptanalytic tradeoff algorithms”, J. Cryptology, 26 (2013), 559–637 | DOI | MR | Zbl
[9] Pilshchikov D. V., “On the limiting mean values in probabilistic models of time-memory-data tradeoff methods”, Mathematical Aspects of Cryptography, 6:2 (2015), 59–65 | MR
[10] Sevastyanov B. A., Vetvyaschiesya protsessy, Nauka, M., 1971