Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference28 articles.
1. G. Avoine, P. Junod, P. Oechslin, Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inf. Syst. Secur.
11(4), 17:1–17:22 (2008). Preliminary version in INDOCRYPT 2005
2. IEE Conference Publication;S.H. Babbage,1995
3. E.P. Barkan, Cryptanalysis of ciphers and protocols. Ph.D. Thesis, Israel Institute of Technology, March 2006
4. LNCS;E. Barkan,2006
5. LNCS;A. Biryukov,2000
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献