1. R. Anderson, A5 (was: Hacking digital phones) (17 June 1994),
http://yarchive.net/phone/gsmcipher.html
, Sci.crypt
2. J.P. Aumasson, I. Dinur, W. Meier, A. Shamir, Cube testers and key recovery attacks on reduced-round md6 and trivium, in Fast Software Encryption, ed. by O. Dunkelman (2009), pp. 1–22
3. S. Babbage, A space/time tradeoff in exhaustive search attacks on stream ciphers, in European Convention on Security and Detection, vol. 408 (IEEE Conference Publication, Los Alamitos, 1995)
4. E. Barkan, E. Biham, A. Shamir, Rigorous bounds on cryptanalytic time/memory tradeoffs, in Proceedings of CRYPTO’06. Lecture Notes in Computer Science, vol. 4117 (Springer, Berlin Heidelberg, 2006), pp. 1–21
5. A. Biryukov, A. Shamir, Cryptanalytic time/memory/data tradeoffs for stream ciphers, in Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (2000), pp. 1–13