1. Borst, J., Preneel, B., Vandewalle, J.: On time-memory tradeoff between exhaustive key search and table precomputation. In: de With, P.H.N., van der Schaar-Mitrea, M. (eds.) 19th Symp. on Information Theory in the Benelux, Veldhoven (NL), May 28-29, pp. 111–118. Werkgemeenschap Informatie- en Communicatietheorie, Enschede, NL (1998)
2. Denning, D.E.: Cryptography and Data Security, p. 100. Addison-Wesley, Reading (1982)
3. Fiat, A., Naor, M.: Rigorous time/space tradeoffs for inverting functions. In: STOC 1991, pp. 534–541 (1991)
4. Hellman, M.E.: A cryptanalytic time-memory trade off. IEEE Transactions on Information Theory IT-26, 401–406 (1980)
5. Kim, I.J., Matsumoto, T.: Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size. TIEICE: IEICE Transactions on Communications/Electronics/Information and Systems (1999)