1. Oechslin
P. (2003). Making a Faster Cryptanalytic Time-Memory Trade-Off. In D. Boneh (Ed.)
Advances in Cryptology - CRYPTO 2003 (Vol. 2729
pp. 617-630). Springer. Section 1
"Introduction
" describes the principle of pre-calculating hash chains to create a time-memory trade-off for reversing hash functions. DOI: https://doi.org/10.1007/978-3-540-45146-436
2. Perrig
A.
& Song
D. (2014). CS 161: Computer Security
Lecture 8: Authentication. University of California
Berkeley. The lecture slides differentiate password cracking methods
explicitly defining rainbow tables as: "Precompute a giant table of hash(password) -> password."
3. Boneh
D. (2022). CS 255: Introduction to Cryptography
Lecture 10: Hash functions. Stanford University. The course notes discuss password hashing and attacks
describing pre-computation attacks (rainbow tables) as a method where an adversary pre-computes a large table of (m
H(m)) pairs.