-
1
-
-
33646826194
-
Time-memory trade-offs: False alarm detection using checkpoints
-
Proceedings of Progress in Cryptology, 6th International Conference on Cryptology INDOCRYPT'05, Cryptology Research Society of India, Springer-Verlag, Bangalore, India
-
AVOINE, G., JUNOD, P., AND OECHSLIN, P. 2005. Time-memory trade-offs: False alarm detection using checkpoints. In Proceedings of Progress in Cryptology - 6th International Conference on Cryptology (INDOCRYPT'05). Lecture Notes in Computer Science, vol. 3797. Cryptology Research Society of India, Springer-Verlag, Bangalore, India, 183-196.
-
(2005)
Lecture Notes in Computer Science
, vol.3797
, pp. 183-196
-
-
AVOINE, G.1
JUNOD, P.2
OECHSLIN, P.3
-
2
-
-
33749576843
-
Rigorous bounds on cryptanalytic time/memory tradeoffs
-
Proceedings of Advances in Cryptology, 26th Annual International Cryptology Conference CRYPTO'06, C. Dwork, Ed, IACR, Springer-Verlag, Santa Barbara, CA
-
BARKAN, E., BIHAM, E., AND SHAMIR, A. 2006. Rigorous bounds on cryptanalytic time/memory tradeoffs. In Proceedings of Advances in Cryptology - 26th Annual International Cryptology Conference (CRYPTO'06). C. Dwork, Ed. Lecture Notes in Computer Science. IACR, Springer-Verlag, Santa Barbara, CA.
-
(2006)
Lecture Notes in Computer Science
-
-
BARKAN, E.1
BIHAM, E.2
SHAMIR, A.3
-
3
-
-
33745626422
-
Improved time-memory trade-offs with multiple data
-
Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography SAC'05, B. Preneel and S. Tavares, Eds, Springer-Verlag, Kingston, Canada
-
BIRYUKOV, A., MUKHOPADHYAY, S., AND SARKAR, P. 2005. Improved time-memory trade-offs with multiple data. In Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05), B. Preneel and S. Tavares, Eds. Lecture Notes in Computer Science, vol. 3897. Springer-Verlag, Kingston, Canada, 110-127.
-
(2005)
Lecture Notes in Computer Science
, vol.3897
, pp. 110-127
-
-
BIRYUKOV, A.1
MUKHOPADHYAY, S.2
SARKAR, P.3
-
4
-
-
49449112045
-
-
BIRYUKOV, A. AND SHAMIR, A. 2001. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In Proceedings of Advances in Cryptology - 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01), C. Boyd, Ed. Lecture Notes in Computer Science, 2248. IACR, Springer-Verlag, Gold Coast, Australia, 1-13.
-
BIRYUKOV, A. AND SHAMIR, A. 2001. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In Proceedings of Advances in Cryptology - 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01), C. Boyd, Ed. Lecture Notes in Computer Science, vol. 2248. IACR, Springer-Verlag, Gold Coast, Australia, 1-13.
-
-
-
-
5
-
-
84974707207
-
Real time cryptanalysis of A5/1 on a PC
-
Proceedings of the Fast Software Encryption, 7th International Workshop FSE'00, B. Schneier, Ed, Springer-Verlag, New York
-
BLRYUKOV, A., SHAMIR, A., AND WAGNER, D. 2000. Real time cryptanalysis of A5/1 on a PC. In Proceedings of the Fast Software Encryption - 7th International Workshop (FSE'00), B. Schneier, Ed. Lecture Notes in Computer Science, vol. 1978. Springer-Verlag, New York, 1-18.
-
(2000)
Lecture Notes in Computer Science
, vol.1978
, pp. 1-18
-
-
BLRYUKOV, A.1
SHAMIR, A.2
WAGNER, D.3
-
6
-
-
0008997475
-
On the time-memory tradeoff between ex-haustive key search and table precomputation
-
P. de With and M. van der Schaar-Mitrea, Eds. Veldhoven, The Netherlands
-
BORST, J., PRENEEL, B., AND VANDEWALLE, J. 1998. On the time-memory tradeoff between ex-haustive key search and table precomputation. In Proceedings of the 19th Symposium on Information Theory in the Benelux, P. de With and M. van der Schaar-Mitrea, Eds. Veldhoven, The Netherlands, 111-118.
-
(1998)
Proceedings of the 19th Symposium on Information Theory in the Benelux
, pp. 111-118
-
-
BORST, J.1
PRENEEL, B.2
VANDEWALLE, J.3
-
9
-
-
0033294770
-
Rigorous time/space tradeoffs for inverting functions
-
December
-
FIAT, A. AND NAOR, M. 1999. Rigorous time/space tradeoffs for inverting functions. SIAM J. Comput. 29, 3 (December), 790-803.
-
(1999)
SIAM J. Comput
, vol.29
, Issue.3
, pp. 790-803
-
-
FIAT, A.1
NAOR, M.2
-
10
-
-
0019038335
-
A cryptanalytic time-memory trade off
-
July
-
HELLMAN, M. 1980. A cryptanalytic time-memory trade off. IEEE Trans. Inform. Theory IT-26, 4 (July), 401-406.
-
(1980)
IEEE Trans. Inform. Theory
, vol.IT-26
, Issue.4
, pp. 401-406
-
-
HELLMAN, M.1
-
11
-
-
33646801962
-
-
HONG, J. AND SARKAR, P. 2005. New applications of time memory data tradeoffs. In Proceedings of Advances in Cryptology - 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'05), B. Roy, Ed. Lecture Notes in Computer Science, 3788. IACR, Springer-Verlag, Chennai, India, 353-372.
-
HONG, J. AND SARKAR, P. 2005. New applications of time memory data tradeoffs. In Proceedings of Advances in Cryptology - 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'05), B. Roy, Ed. Lecture Notes in Computer Science, vol. 3788. IACR, Springer-Verlag, Chennai, India, 353-372.
-
-
-
-
13
-
-
0029733777
-
Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32, and Skipjack
-
January
-
KUSUDA, K. AND MATSUMOTO, T. 1996. Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32, and Skipjack. IEICE Trans. Fundamentals E79-A, 1 (January), 35-48.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.1
, pp. 35-48
-
-
KUSUDA, K.1
MATSUMOTO, T.2
-
14
-
-
33744938646
-
Cracking Unix passwords using FPGA platforms
-
MENTENS, N., BATINA, L., PRENEEL, B., AND VERBAUWHEDE, I. 2005. Cracking Unix passwords using FPGA platforms. In Proceedings of the Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'05).
-
(2005)
Proceedings of the Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'05)
-
-
MENTENS, N.1
BATINA, L.2
PRENEEL, B.3
VERBAUWHEDE, I.4
-
15
-
-
35248858454
-
-
OECHSLIN, P. 2003. Making a faster cryptanalytic time-memory trade-off. In Proceedings of Advances in Cryptology - 23th Annual International Cryptology Conference (CRYPTO'03), D. Boneh, Ed. Lecture Notes in Computer Science, 2729. IACR, Springer-Verlag, Santa Barbara, CA. 617-630.
-
OECHSLIN, P. 2003. Making a faster cryptanalytic time-memory trade-off. In Proceedings of Advances in Cryptology - 23th Annual International Cryptology Conference (CRYPTO'03), D. Boneh, Ed. Lecture Notes in Computer Science, vol. 2729. IACR, Springer-Verlag, Santa Barbara, CA. 617-630.
-
-
-
-
16
-
-
49449117507
-
-
QUISQUATER, J.-J. AND DELESCAILLE, J.-P. 1989. How easy is collision search? Application to DES (extended summary). In Proceedings of Advances in Cryptology - Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'89), J.-J. Quisquater and V. Joos, Eds. Lecture Notes in Computer Science, 434. IACR, Springer-Verlag, Houthalen, Belgium, 429-434.
-
QUISQUATER, J.-J. AND DELESCAILLE, J.-P. 1989. How easy is collision search? Application to DES (extended summary). In Proceedings of Advances in Cryptology - Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'89), J.-J. Quisquater and V. Joos, Eds. Lecture Notes in Computer Science, vol. 434. IACR, Springer-Verlag, Houthalen, Belgium, 429-434.
-
-
-
-
17
-
-
21644485720
-
-
STANDAERT, F. C.-X., ROUVROY, G., QUISQUATER, J.-J., AND LEGAT, J.-D. 2002. A time-memory tradeoff using distinguished points: New analysis & FPGA results. In Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02), B. Kaliski, C. K. Koç, and C. Paar, Eds. Lecture Notes in Computer Science, 2523. Springer-Verlag, Redwood Shores, CA. 593-609.
-
STANDAERT, F. C.-X., ROUVROY, G., QUISQUATER, J.-J., AND LEGAT, J.-D. 2002. A time-memory tradeoff using distinguished points: New analysis & FPGA results. In Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02), B. Kaliski, C. K. Koç, and C. Paar, Eds. Lecture Notes in Computer Science, vol. 2523. Springer-Verlag, Redwood Shores, CA. 593-609.
-
-
-
-
18
-
-
17444376558
-
-
WIENER, M. AND VAN OORSCHOT, P. 1999. Parallel collision search with cryptanalytic applications. J. Crypto. 12, 1 (March), 1-28.
-
WIENER, M. AND VAN OORSCHOT, P. 1999. Parallel collision search with cryptanalytic applications. J. Crypto. 12, 1 (March), 1-28.
-
-
-
|