메뉴 건너뛰기




Volumn 109, Issue 7, 2009, Pages 347-351

Success probability of the Hellman trade-off

Author keywords

Analysis of algorithms; Cryptography; Hellman table; Time memory trade off

Indexed keywords

CONTROL THEORY; CRYPTOGRAPHY;

EID: 59349085504     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ipl.2008.12.002     Document Type: Article
Times cited : (7)

References (8)
  • 2
    • 33749576843 scopus 로고    scopus 로고
    • Rigorous bounds on cryptanalytic time/memory tradeoffs
    • Advances in Cryptology, Proceedings of Crypto 2006, Springer-Verlag
    • Barkan E., Biham E., and Shamir A. Rigorous bounds on cryptanalytic time/memory tradeoffs. Advances in Cryptology, Proceedings of Crypto 2006. LNCS vol. 4117 (2006), Springer-Verlag 1-21
    • (2006) LNCS , vol.4117 , pp. 1-21
    • Barkan, E.1    Biham, E.2    Shamir, A.3
  • 3
    • 0004238984 scopus 로고
    • Addison-Wesley p. 100 (Ron Rivest's distinguished points observation)
    • Denning D.E. Cryptography and Data Security (1982), Addison-Wesley p. 100 (Ron Rivest's distinguished points observation)
    • (1982) Cryptography and Data Security
    • Denning, D.E.1
  • 4
    • 84915939958 scopus 로고
    • Random mapping statistics
    • Advances in Cryptology, Proceedings of Eurocrypt'89, Springer-Verlag
    • Flajolet P., and Odlyzko A.M. Random mapping statistics. Advances in Cryptology, Proceedings of Eurocrypt'89. LNCS vol. 434 (1990), Springer-Verlag 329-354
    • (1990) LNCS , vol.434 , pp. 329-354
    • Flajolet, P.1    Odlyzko, A.M.2
  • 6
    • 41549083388 scopus 로고    scopus 로고
    • Variants of the distinguished point method for cryptanalytic time memory trade-offs
    • Information Security Practice and Experience, Proceedings of ISPEC 2008, Springer-Verlag
    • Hong J., Jeong K.C., Kwon E.Y., Lee I.-S., and Ma D. Variants of the distinguished point method for cryptanalytic time memory trade-offs. Information Security Practice and Experience, Proceedings of ISPEC 2008. LNCS vol. 4991 (2008), Springer-Verlag 131-145
    • (2008) LNCS , vol.4991 , pp. 131-145
    • Hong, J.1    Jeong, K.C.2    Kwon, E.Y.3    Lee, I.-S.4    Ma, D.5
  • 7
    • 0029733777 scopus 로고    scopus 로고
    • Optimization of time-memory trade-off cryptanalysis and is application to DES, FEAL-32, and Skipjack
    • Kusuda K., and Matsumoto T. Optimization of time-memory trade-off cryptanalysis and is application to DES, FEAL-32, and Skipjack. IEICE Transactions on Fundamentals E-79A 1 (1996) 35-48
    • (1996) IEICE Transactions on Fundamentals , vol.E-79A , Issue.1 , pp. 35-48
    • Kusuda, K.1    Matsumoto, T.2
  • 8
    • 35248858454 scopus 로고    scopus 로고
    • Making a faster cryptanalytic time-memory trade-off
    • Advances in Cryptology, Proceedings of Crypto 2003, Springer-Verlag
    • Oechslin P. Making a faster cryptanalytic time-memory trade-off. Advances in Cryptology, Proceedings of Crypto 2003. LNCS vol. 2729 (2003), Springer-Verlag 617-630
    • (2003) LNCS , vol.2729 , pp. 617-630
    • Oechslin, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.