Author:
Barkan Elad,Biham Eli,Shamir Adi
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Avoine, G., Junod, P., Oechslin, P.: Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints (Extended Version) (2005), Available online on: http://lasecwww.epfl.ch/pub/lasec/doc/AJO05a.pdf
2. Lecture Notes in Computer Science;S. Babbage,1996
3. Barkan, E.: Cryptanalysis of Ciphers and Protocols, Ph.D. Thesis (2006), http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-info.cgi?2006/PHD/+PHD-2006-04+
4. Biham, E.: How to decrypt or even substitute DES-encrypted messages in 228 steps. Information Processing Letters 84(3), 117–124 (2002)
5. Biryukov, A.: Some Thoughts on Time-Memory-Data Tradeoffs, IACR ePrint Report 2005/207 (2005), http://eprint.iacr.org/2005/207.pdf+
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献