[1] M. E. Hellman, “A Cryptanalytic Time-Memory Trade Off,” IEEE Transactions on Information Theory, vol. IT-26, no.4, JULY 1980.##
[2] E. P. Barkan, “Cryptanalysis of Ciphers and Protocols,” Research Thesis for the Degree of Doctor of Philosophy, Submitted to the Senate of the Technion-Computer Science Department, Ph.D. Thesis, 2006.##
[3] D. E. Denning, “Cryptography and Data Security,” p. 100, Addison-Wesley, Publishing Company, Boston, 1st edition, 1982.##
[4] P. Oechslin, “Making a F. Aster Cryptanalytic Time-Memory Trade-Off,” in Advances in Cryptology-CRYPTO 2003, vol. 2729 of Lecture Notes in Computer Science, pp. 617-630, Springer 2003.##
[5] E. Barkan, E. Biham, and A. Shamir, “Rigorous bounds on cryptanalytic time/memory tradeoff,” S. Inc. Dwork, editor, CRYPTO, vol. 4117 of Lecture Notes in Computer Science, pp. 1–21, Springer 2006.##
[6] K. Nohl and C. Paget, “GSM-SRSLY,” Congress slides during CCC 2009, retrieved from http:/events.ccc.de/congress/2009/F. Ahrplan/attachments/1519_26C3, Karsten. Nohl. GSM. Pdf, December 2009.##
[7] K. Nohl, “Attacking phone privacy,” Convention slides during Black Hat USA 2010, retrieved from https://media.blackhat.com/bh-us-10/whitepapers/Nohl/BlackHat-USA-2010-Nohl-Attacking- Phone.Privacy-wp.pdf, 2010.##
[8] R. Chung-Wei Phan, “Mini Advanced Encryption Standard (Mini-AES): A Testbed for Cryptanalysis Students,” Published in Cryptologia, XXVI (4), 2002.##
[9] C. Cid, S. Murphy, and M. J. B. Robshaw, “Small Scale Variants of the AES,” Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K, 2005.##
[10] P. Flajolet and A. M. Odlyzko, “Random Mapping Statistics”, in Advances in Cryptology- Eurocrypt'89, LNCS 434, pp. 329-354, 1990, Springer-Verlag Berlin Heidelberg 1990.##
[11] R. Sedgewick and P. Flajolet, “An Introduction to the Analysis of Algorithms,” Second Edition, Princeton University, INRIA Rocquencourt, Addison-Wesley, Library of Congress Control Number: 2012955493, 2013.##