메뉴 건너뛰기




Volumn 11, Issue 4, 2008, Pages

Characterization and improvement of time-memory trade-off based on perfect tables

Author keywords

Cryptography; Hellman's time memory trade off; Password cracking; Rainbow tables

Indexed keywords

FALSE ALARMS; HELLMAN'S TIME-MEMORY TRADE-OFF; PASSWORD CRACKING; POINT-BASED; RAINBOW TABLES; TIME-MEMORY TRADE-OFF;

EID: 49449086865     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1380564.1380565     Document Type: Article
Times cited : (52)

References (18)
  • 1
    • 33646826194 scopus 로고    scopus 로고
    • Time-memory trade-offs: False alarm detection using checkpoints
    • Proceedings of Progress in Cryptology, 6th International Conference on Cryptology INDOCRYPT'05, Cryptology Research Society of India, Springer-Verlag, Bangalore, India
    • AVOINE, G., JUNOD, P., AND OECHSLIN, P. 2005. Time-memory trade-offs: False alarm detection using checkpoints. In Proceedings of Progress in Cryptology - 6th International Conference on Cryptology (INDOCRYPT'05). Lecture Notes in Computer Science, vol. 3797. Cryptology Research Society of India, Springer-Verlag, Bangalore, India, 183-196.
    • (2005) Lecture Notes in Computer Science , vol.3797 , pp. 183-196
    • AVOINE, G.1    JUNOD, P.2    OECHSLIN, P.3
  • 2
    • 33749576843 scopus 로고    scopus 로고
    • Rigorous bounds on cryptanalytic time/memory tradeoffs
    • Proceedings of Advances in Cryptology, 26th Annual International Cryptology Conference CRYPTO'06, C. Dwork, Ed, IACR, Springer-Verlag, Santa Barbara, CA
    • BARKAN, E., BIHAM, E., AND SHAMIR, A. 2006. Rigorous bounds on cryptanalytic time/memory tradeoffs. In Proceedings of Advances in Cryptology - 26th Annual International Cryptology Conference (CRYPTO'06). C. Dwork, Ed. Lecture Notes in Computer Science. IACR, Springer-Verlag, Santa Barbara, CA.
    • (2006) Lecture Notes in Computer Science
    • BARKAN, E.1    BIHAM, E.2    SHAMIR, A.3
  • 3
    • 33745626422 scopus 로고    scopus 로고
    • Improved time-memory trade-offs with multiple data
    • Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography SAC'05, B. Preneel and S. Tavares, Eds, Springer-Verlag, Kingston, Canada
    • BIRYUKOV, A., MUKHOPADHYAY, S., AND SARKAR, P. 2005. Improved time-memory trade-offs with multiple data. In Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05), B. Preneel and S. Tavares, Eds. Lecture Notes in Computer Science, vol. 3897. Springer-Verlag, Kingston, Canada, 110-127.
    • (2005) Lecture Notes in Computer Science , vol.3897 , pp. 110-127
    • BIRYUKOV, A.1    MUKHOPADHYAY, S.2    SARKAR, P.3
  • 4
    • 49449112045 scopus 로고    scopus 로고
    • BIRYUKOV, A. AND SHAMIR, A. 2001. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In Proceedings of Advances in Cryptology - 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01), C. Boyd, Ed. Lecture Notes in Computer Science, 2248. IACR, Springer-Verlag, Gold Coast, Australia, 1-13.
    • BIRYUKOV, A. AND SHAMIR, A. 2001. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In Proceedings of Advances in Cryptology - 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01), C. Boyd, Ed. Lecture Notes in Computer Science, vol. 2248. IACR, Springer-Verlag, Gold Coast, Australia, 1-13.
  • 5
    • 84974707207 scopus 로고    scopus 로고
    • Real time cryptanalysis of A5/1 on a PC
    • Proceedings of the Fast Software Encryption, 7th International Workshop FSE'00, B. Schneier, Ed, Springer-Verlag, New York
    • BLRYUKOV, A., SHAMIR, A., AND WAGNER, D. 2000. Real time cryptanalysis of A5/1 on a PC. In Proceedings of the Fast Software Encryption - 7th International Workshop (FSE'00), B. Schneier, Ed. Lecture Notes in Computer Science, vol. 1978. Springer-Verlag, New York, 1-18.
    • (2000) Lecture Notes in Computer Science , vol.1978 , pp. 1-18
    • BLRYUKOV, A.1    SHAMIR, A.2    WAGNER, D.3
  • 6
    • 0008997475 scopus 로고    scopus 로고
    • On the time-memory tradeoff between ex-haustive key search and table precomputation
    • P. de With and M. van der Schaar-Mitrea, Eds. Veldhoven, The Netherlands
    • BORST, J., PRENEEL, B., AND VANDEWALLE, J. 1998. On the time-memory tradeoff between ex-haustive key search and table precomputation. In Proceedings of the 19th Symposium on Information Theory in the Benelux, P. de With and M. van der Schaar-Mitrea, Eds. Veldhoven, The Netherlands, 111-118.
    • (1998) Proceedings of the 19th Symposium on Information Theory in the Benelux , pp. 111-118
    • BORST, J.1    PRENEEL, B.2    VANDEWALLE, J.3
  • 9
    • 0033294770 scopus 로고    scopus 로고
    • Rigorous time/space tradeoffs for inverting functions
    • December
    • FIAT, A. AND NAOR, M. 1999. Rigorous time/space tradeoffs for inverting functions. SIAM J. Comput. 29, 3 (December), 790-803.
    • (1999) SIAM J. Comput , vol.29 , Issue.3 , pp. 790-803
    • FIAT, A.1    NAOR, M.2
  • 10
    • 0019038335 scopus 로고
    • A cryptanalytic time-memory trade off
    • July
    • HELLMAN, M. 1980. A cryptanalytic time-memory trade off. IEEE Trans. Inform. Theory IT-26, 4 (July), 401-406.
    • (1980) IEEE Trans. Inform. Theory , vol.IT-26 , Issue.4 , pp. 401-406
    • HELLMAN, M.1
  • 11
    • 33646801962 scopus 로고    scopus 로고
    • HONG, J. AND SARKAR, P. 2005. New applications of time memory data tradeoffs. In Proceedings of Advances in Cryptology - 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'05), B. Roy, Ed. Lecture Notes in Computer Science, 3788. IACR, Springer-Verlag, Chennai, India, 353-372.
    • HONG, J. AND SARKAR, P. 2005. New applications of time memory data tradeoffs. In Proceedings of Advances in Cryptology - 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'05), B. Roy, Ed. Lecture Notes in Computer Science, vol. 3788. IACR, Springer-Verlag, Chennai, India, 353-372.
  • 13
    • 0029733777 scopus 로고    scopus 로고
    • Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32, and Skipjack
    • January
    • KUSUDA, K. AND MATSUMOTO, T. 1996. Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32, and Skipjack. IEICE Trans. Fundamentals E79-A, 1 (January), 35-48.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.1 , pp. 35-48
    • KUSUDA, K.1    MATSUMOTO, T.2
  • 15
    • 35248858454 scopus 로고    scopus 로고
    • OECHSLIN, P. 2003. Making a faster cryptanalytic time-memory trade-off. In Proceedings of Advances in Cryptology - 23th Annual International Cryptology Conference (CRYPTO'03), D. Boneh, Ed. Lecture Notes in Computer Science, 2729. IACR, Springer-Verlag, Santa Barbara, CA. 617-630.
    • OECHSLIN, P. 2003. Making a faster cryptanalytic time-memory trade-off. In Proceedings of Advances in Cryptology - 23th Annual International Cryptology Conference (CRYPTO'03), D. Boneh, Ed. Lecture Notes in Computer Science, vol. 2729. IACR, Springer-Verlag, Santa Barbara, CA. 617-630.
  • 16
    • 49449117507 scopus 로고    scopus 로고
    • QUISQUATER, J.-J. AND DELESCAILLE, J.-P. 1989. How easy is collision search? Application to DES (extended summary). In Proceedings of Advances in Cryptology - Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'89), J.-J. Quisquater and V. Joos, Eds. Lecture Notes in Computer Science, 434. IACR, Springer-Verlag, Houthalen, Belgium, 429-434.
    • QUISQUATER, J.-J. AND DELESCAILLE, J.-P. 1989. How easy is collision search? Application to DES (extended summary). In Proceedings of Advances in Cryptology - Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT'89), J.-J. Quisquater and V. Joos, Eds. Lecture Notes in Computer Science, vol. 434. IACR, Springer-Verlag, Houthalen, Belgium, 429-434.
  • 17
    • 21644485720 scopus 로고    scopus 로고
    • STANDAERT, F. C.-X., ROUVROY, G., QUISQUATER, J.-J., AND LEGAT, J.-D. 2002. A time-memory tradeoff using distinguished points: New analysis & FPGA results. In Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02), B. Kaliski, C. K. Koç, and C. Paar, Eds. Lecture Notes in Computer Science, 2523. Springer-Verlag, Redwood Shores, CA. 593-609.
    • STANDAERT, F. C.-X., ROUVROY, G., QUISQUATER, J.-J., AND LEGAT, J.-D. 2002. A time-memory tradeoff using distinguished points: New analysis & FPGA results. In Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES'02), B. Kaliski, C. K. Koç, and C. Paar, Eds. Lecture Notes in Computer Science, vol. 2523. Springer-Verlag, Redwood Shores, CA. 593-609.
  • 18
    • 17444376558 scopus 로고    scopus 로고
    • WIENER, M. AND VAN OORSCHOT, P. 1999. Parallel collision search with cryptanalytic applications. J. Crypto. 12, 1 (March), 1-28.
    • WIENER, M. AND VAN OORSCHOT, P. 1999. Parallel collision search with cryptanalytic applications. J. Crypto. 12, 1 (March), 1-28.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.