Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Hellman M., “A cryptanalytic time-memory tradeoff”, IEEE Trans. Inf. Theory, IT-26:4 (1980), 401–406 | DOI | MR | Zbl
[2] Denning D., Cryptography and Data Security, Addison-Wesley, Boston, Massachusetts, USA, 1982, 100 pp. | Zbl
[3] Oechslin Ph., “Making a faster cryptanalytic time-memory tradeoff”, CRYPTO'03, Lect. Notes Comput. Sci., 2729, Springer-Verlag, 617–630 | DOI | MR | Zbl
[4] Biryukov A., Shamir A., Wagner D., “Real time cryptanalysis of A5/1 on a PC”, FSE 2000, Lect. Notes Comput. Sci., 1978, Springer-Verlag, 1–18 | MR | Zbl
[5] Saarinen M-J. O., “A time-memory tradeoff attack against LILI-128”, FSE 2002, Lect. Notes Comput. Sci., 2365, 231–236 | DOI | Zbl
[6] Mentens N., Batina L., Preneel B., Verbauwhede I., “Cracking Unix passwords using FPGA platforms”, ECRYPT Workshop, SHARCS — Special Purpose Hardware for Attacking Cryptographic Systems, 2005, 83–91 | MR
[7] Bono S., Green M., Stubblefield A., Juels A., Rubin A., M. Szydlo, “Security analysis of a cryptographically-enabled RFID device”, USENIX'05, 1–16
[8] Kusuda K., Matsumoto T., “Optimization of time-memory tradeoff cryptanalysis and its application to DES, FEAL-32 and Skipjack”, IEICE Trans. Fundamentals, E79-A:1 (1996), 35–48
[9] Borst J., Preneel B., Vandewalle J., “On the time-memory tradeoff between exhaustive key search and table precomputation”, Proc. 19th Symp. Inf. Theory in the Benelux, 1998, 111–118
[10] Borst J., Block ciphers: design, analysis, and side-channel analysis, Ph.D. Thesis, Katholieke Univ. Leuven, 2001
[11] Standaert F.-X., Rouvroy G., Quisquater J.-J., Legat J.-D., “A time-memory tradeoff using distinguished points: New analysis FPGA results”, CHES 2002, Lect. Notes Comput. Sci. 2523, Springer, 2003, 593–609 | DOI
[12] Saran A. N., Time memory tradeoff attack on symmetric ciphers, Ph.D. Thesis, Middle East Techn. Univ., 2009
[13] Hong J., Moon S., “A comparison of cryptanalytic tradeoff algorithms”, J. Cryptology, 26 (2013), 559–637 | DOI | MR | Zbl
[14] Hoch Y. Z., Security analysis of generic iterated hash functions, Ph.D. Thesis, Weizmann Inst. Sci., 2009 | MR
[15] Shamir A., “Random graphs in security and privacy”, Invited talk, ICITS 2009
[16] Pilschikov D. V., “Ob odnom teoretiko-veroyatnostnom podkhode k obosnovaniyu nadezhnosti metoda Khellmana”, Matematicheskie voprosy kriptografii, 10:1 (2019), 83–114 | MR