Cryptology ePrint Archive: Report 2009/020
Available versions in chronological order
20090113:054849 (posted 13-Jan-2009 05:48:49 UTC)
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
Jiali Choy and Khoongming Khoo and Chuan-Wen Loe
Publication Info: ICICS 2008, Springer, LNCS 5308, pp. 157-173
[
Cryptology ePrint archive
]