메뉴 건너뛰기




Volumn , Issue , 2009, Pages 504-509

Choosing parameters to achieve a higher success rate for hellman time memory trade off attack

Author keywords

Cryptanalysis; Success probability; Symmetric key cryptography; Time memory trade off attack

Indexed keywords

BLOCK CIPHERS; CRYPTANALYSIS; DES (DATA ENCRYPTION STANDARD); EXHAUSTIVE SEARCH; NEW PARAMETERS; ONE-WAY FUNCTIONS; PREIMAGES; PROBABILISTIC METHODS; SEARCH OPERATIONS; SUCCESS PROBABILITY; SYMMETRIC KEY CRYPTOGRAPHY; TIME MEMORY TRADE OFF ATTACK; TMTO ATTACKS; TRADE OFF;

EID: 70349669575     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.140     Document Type: Conference Paper
Times cited : (8)

References (20)
  • 1
    • 33646826194 scopus 로고    scopus 로고
    • Time-memory trade-offs: False alarm detection using checkpoints
    • S. Maitra, C. E. V. Madhavan, and R. Venkatesan, editors, INDOCRYPT, of, Springer
    • G. Avoine, P. Junod, and P. Oechslin. Time-memory trade-offs: False alarm detection using checkpoints. In S. Maitra, C. E. V. Madhavan, and R. Venkatesan, editors, INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, pages 183-196. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3797 , pp. 183-196
    • Avoine, G.1    Junod, P.2    Oechslin, P.3
  • 2
    • 49449086865 scopus 로고    scopus 로고
    • Characterization and improvement of time-memory trade-off based on perfect tables
    • G. Avoine, P. Junod, and P. Oechslin. Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inf. Syst. Secur., 11(4):1-22, 2008.
    • (2008) ACM Trans. Inf. Syst. Secur , vol.11 , Issue.4 , pp. 1-22
    • Avoine, G.1    Junod, P.2    Oechslin, P.3
  • 3
    • 0029218160 scopus 로고
    • Improved "'exhaustive search'" attacks on stream ciphers
    • IEE Conference Publication, May
    • S. Babbage. Improved "'exhaustive search'" attacks on stream ciphers. In ECOS 95 (European Convention on Security and Detection), number 408 in IEE Conference Publication, May 1995.
    • (1995) ECOS 95 (European Convention on Security and Detection) , Issue.408
    • Babbage, S.1
  • 4
    • 33749576843 scopus 로고    scopus 로고
    • Rigorous bounds on cryptanalytic time/memory tradeoffs
    • C. Dwork, editor, CRYPTO, of, Springer
    • E. Barkan, E. Biham, and A. Shamir. Rigorous bounds on cryptanalytic time/memory tradeoffs. In C. Dwork, editor, CRYPTO, volume 4117 of Lecture Notes in Computer Science, pages 1-21. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4117 , pp. 1-21
    • Barkan, E.1    Biham, E.2    Shamir, A.3
  • 5
    • 33745626422 scopus 로고    scopus 로고
    • Improved time-memory trade-offs with multiple data
    • B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography, of, Springer
    • A. Biryukov, S. Mukhopadhyay, and P. Sarkar. Improved time-memory trade-offs with multiple data. In B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, pages 110-127. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3897 , pp. 110-127
    • Biryukov, A.1    Mukhopadhyay, S.2    Sarkar, P.3
  • 6
    • 84937419430 scopus 로고    scopus 로고
    • Cryptanalytic time/memory/data tradeoffs for stream ciphers
    • T. Okamoto, editor, ASIACRYPT, of, Springer
    • A. Biryukov and A. Shamir. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In T. Okamoto, editor, ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, pages 1-13. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 1-13
    • Biryukov, A.1    Shamir, A.2
  • 7
    • 84974707207 scopus 로고    scopus 로고
    • A. Biryukov, A. Shamir, and D. Wagner. Real time cryptanalysis of a5/1 on a pc. In B. Schneier, editor, FSE, 1978 of Lecture Notes in Computer Science, pages 1-18. Springer, 2000.
    • A. Biryukov, A. Shamir, and D. Wagner. Real time cryptanalysis of a5/1 on a pc. In B. Schneier, editor, FSE, volume 1978 of Lecture Notes in Computer Science, pages 1-18. Springer, 2000.
  • 9
    • 70349719358 scopus 로고    scopus 로고
    • J. Borst, B. Preneel, and J. Vandewalle. On timememory tradeoff between exhaustive key search and table precomputation. In P. H. N. de With and M. van der Schaar-Mitrea, editors, Proc. of 19th Symp. on Information Theory in the Benelux, pages 111-118, Veldhoven (NL), 28-29 1998. Werkgemeenschap Informatie- en Communicatietheorie, Enschede (NL).
    • J. Borst, B. Preneel, and J. Vandewalle. On timememory tradeoff between exhaustive key search and table precomputation. In P. H. N. de With and M. van der Schaar-Mitrea, editors, Proc. of 19th Symp. on Information Theory in the Benelux, pages 111-118, Veldhoven (NL), 28-29 1998. Werkgemeenschap Informatie- en Communicatietheorie, Enschede (NL).
  • 11
    • 84957381006 scopus 로고    scopus 로고
    • Cryptanalysis of alleged a5 stream cipher
    • J. D. Golic. Cryptanalysis of alleged a5 stream cipher. In EUROCRYPT, pages 239-255, 1997.
    • (1997) EUROCRYPT , pp. 239-255
    • Golic, J.D.1
  • 13
    • 41549083388 scopus 로고    scopus 로고
    • J. Hong, K. C. Jeong, E. Y. Kwon, I.-S. Lee, and D. Ma. Variants of the distinguished point method for cryptanalytic time memory trade-offs. In L. Chen, Y. Mu, and W. Susilo, editors, ISPEC, 4991 of Lecture Notes in Computer Science, pages 131-145. Springer, 2008.
    • J. Hong, K. C. Jeong, E. Y. Kwon, I.-S. Lee, and D. Ma. Variants of the distinguished point method for cryptanalytic time memory trade-offs. In L. Chen, Y. Mu, and W. Susilo, editors, ISPEC, volume 4991 of Lecture Notes in Computer Science, pages 131-145. Springer, 2008.
  • 14
    • 33646801962 scopus 로고    scopus 로고
    • New applications of time memory data tradeoffs
    • B. K. Roy, editor, ASIACRYPT, of, Springer
    • J. Hong and P. Sarkar. New applications of time memory data tradeoffs. In B. K. Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 353-372. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 353-372
    • Hong, J.1    Sarkar, P.2
  • 16
    • 0032680924 scopus 로고    scopus 로고
    • Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size
    • I.-J. Kim and T. Matsumoto. Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size. IEICE Transactions on Fundamentals, E82-A(1):123-129, 1999.
    • (1999) IEICE Transactions on Fundamentals , vol.E82-A , Issue.1 , pp. 123-129
    • Kim, I.-J.1    Matsumoto, T.2
  • 17
    • 0029733777 scopus 로고    scopus 로고
    • Optimization of timememory trade-off cryptanalysis and its application to des, feal-32 and skipjack
    • K. Kusuda and T. Matsumoto. Optimization of timememory trade-off cryptanalysis and its application to des, feal-32 and skipjack. IEICE Transactions on Fundamentals, E79-A(1):35-48, 1996.
    • (1996) IEICE Transactions on Fundamentals , vol.E79-A , Issue.1 , pp. 35-48
    • Kusuda, K.1    Matsumoto, T.2
  • 18
    • 35248858454 scopus 로고    scopus 로고
    • Making a faster cryptanalytic time-memory trade-off
    • D. Boneh, editor, CRYPTO, of, Springer
    • P. Oechslin. Making a faster cryptanalytic time-memory trade-off. In D. Boneh, editor, CRYPTO, volume 2729 of Lecture Notes in Computer Science, pages 617-630. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 617-630
    • Oechslin, P.1
  • 19
    • 84949427555 scopus 로고    scopus 로고
    • M.-J. O. Saarinen. A time-memory tradeoff attack against lili-128. In J. Daemen and V. Rijmen, editors, FSE, 2365 of Lecture Notes in Computer Science, pages 231-236. Springer, 2002.
    • M.-J. O. Saarinen. A time-memory tradeoff attack against lili-128. In J. Daemen and V. Rijmen, editors, FSE, volume 2365 of Lecture Notes in Computer Science, pages 231-236. Springer, 2002.
  • 20
    • 21644485720 scopus 로고    scopus 로고
    • F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, and J.- D. Legat. A time-memory tradeoff using distinguished points: New analysis & fpga results. In B. S. K. Jr., Çetin Kaya Koç, and C. Paar, editors, CHES, 2523 of Lecture Notes in Computer Science, pages 593-609. Springer, 2002.
    • F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, and J.- D. Legat. A time-memory tradeoff using distinguished points: New analysis & fpga results. In B. S. K. Jr., Çetin Kaya Koç, and C. Paar, editors, CHES, volume 2523 of Lecture Notes in Computer Science, pages 593-609. Springer, 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.