Watch this video on YouTube
Which of the following attack techniques uses the cryptanalytic time-memory trade-off and requires less time than other techniques?