-
1
-
-
33646826194
-
Time-memory trade-offs: False alarm detection using checkpoints
-
S. Maitra, C. E. V. Madhavan, and R. Venkatesan, editors, INDOCRYPT, of, Springer
-
G. Avoine, P. Junod, and P. Oechslin. Time-memory trade-offs: False alarm detection using checkpoints. In S. Maitra, C. E. V. Madhavan, and R. Venkatesan, editors, INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, pages 183-196. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3797
, pp. 183-196
-
-
Avoine, G.1
Junod, P.2
Oechslin, P.3
-
2
-
-
49449086865
-
Characterization and improvement of time-memory trade-off based on perfect tables
-
G. Avoine, P. Junod, and P. Oechslin. Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inf. Syst. Secur., 11(4):1-22, 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur
, vol.11
, Issue.4
, pp. 1-22
-
-
Avoine, G.1
Junod, P.2
Oechslin, P.3
-
3
-
-
0029218160
-
Improved "'exhaustive search'" attacks on stream ciphers
-
IEE Conference Publication, May
-
S. Babbage. Improved "'exhaustive search'" attacks on stream ciphers. In ECOS 95 (European Convention on Security and Detection), number 408 in IEE Conference Publication, May 1995.
-
(1995)
ECOS 95 (European Convention on Security and Detection)
, Issue.408
-
-
Babbage, S.1
-
4
-
-
33749576843
-
Rigorous bounds on cryptanalytic time/memory tradeoffs
-
C. Dwork, editor, CRYPTO, of, Springer
-
E. Barkan, E. Biham, and A. Shamir. Rigorous bounds on cryptanalytic time/memory tradeoffs. In C. Dwork, editor, CRYPTO, volume 4117 of Lecture Notes in Computer Science, pages 1-21. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4117
, pp. 1-21
-
-
Barkan, E.1
Biham, E.2
Shamir, A.3
-
5
-
-
33745626422
-
Improved time-memory trade-offs with multiple data
-
B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography, of, Springer
-
A. Biryukov, S. Mukhopadhyay, and P. Sarkar. Improved time-memory trade-offs with multiple data. In B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, pages 110-127. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3897
, pp. 110-127
-
-
Biryukov, A.1
Mukhopadhyay, S.2
Sarkar, P.3
-
6
-
-
84937419430
-
Cryptanalytic time/memory/data tradeoffs for stream ciphers
-
T. Okamoto, editor, ASIACRYPT, of, Springer
-
A. Biryukov and A. Shamir. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In T. Okamoto, editor, ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, pages 1-13. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
7
-
-
84974707207
-
-
A. Biryukov, A. Shamir, and D. Wagner. Real time cryptanalysis of a5/1 on a pc. In B. Schneier, editor, FSE, 1978 of Lecture Notes in Computer Science, pages 1-18. Springer, 2000.
-
A. Biryukov, A. Shamir, and D. Wagner. Real time cryptanalysis of a5/1 on a pc. In B. Schneier, editor, FSE, volume 1978 of Lecture Notes in Computer Science, pages 1-18. Springer, 2000.
-
-
-
-
9
-
-
70349719358
-
-
J. Borst, B. Preneel, and J. Vandewalle. On timememory tradeoff between exhaustive key search and table precomputation. In P. H. N. de With and M. van der Schaar-Mitrea, editors, Proc. of 19th Symp. on Information Theory in the Benelux, pages 111-118, Veldhoven (NL), 28-29 1998. Werkgemeenschap Informatie- en Communicatietheorie, Enschede (NL).
-
J. Borst, B. Preneel, and J. Vandewalle. On timememory tradeoff between exhaustive key search and table precomputation. In P. H. N. de With and M. van der Schaar-Mitrea, editors, Proc. of 19th Symp. on Information Theory in the Benelux, pages 111-118, Veldhoven (NL), 28-29 1998. Werkgemeenschap Informatie- en Communicatietheorie, Enschede (NL).
-
-
-
-
11
-
-
84957381006
-
Cryptanalysis of alleged a5 stream cipher
-
J. D. Golic. Cryptanalysis of alleged a5 stream cipher. In EUROCRYPT, pages 239-255, 1997.
-
(1997)
EUROCRYPT
, pp. 239-255
-
-
Golic, J.D.1
-
13
-
-
41549083388
-
-
J. Hong, K. C. Jeong, E. Y. Kwon, I.-S. Lee, and D. Ma. Variants of the distinguished point method for cryptanalytic time memory trade-offs. In L. Chen, Y. Mu, and W. Susilo, editors, ISPEC, 4991 of Lecture Notes in Computer Science, pages 131-145. Springer, 2008.
-
J. Hong, K. C. Jeong, E. Y. Kwon, I.-S. Lee, and D. Ma. Variants of the distinguished point method for cryptanalytic time memory trade-offs. In L. Chen, Y. Mu, and W. Susilo, editors, ISPEC, volume 4991 of Lecture Notes in Computer Science, pages 131-145. Springer, 2008.
-
-
-
-
14
-
-
33646801962
-
New applications of time memory data tradeoffs
-
B. K. Roy, editor, ASIACRYPT, of, Springer
-
J. Hong and P. Sarkar. New applications of time memory data tradeoffs. In B. K. Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 353-372. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 353-372
-
-
Hong, J.1
Sarkar, P.2
-
16
-
-
0032680924
-
Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size
-
I.-J. Kim and T. Matsumoto. Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size. IEICE Transactions on Fundamentals, E82-A(1):123-129, 1999.
-
(1999)
IEICE Transactions on Fundamentals
, vol.E82-A
, Issue.1
, pp. 123-129
-
-
Kim, I.-J.1
Matsumoto, T.2
-
17
-
-
0029733777
-
Optimization of timememory trade-off cryptanalysis and its application to des, feal-32 and skipjack
-
K. Kusuda and T. Matsumoto. Optimization of timememory trade-off cryptanalysis and its application to des, feal-32 and skipjack. IEICE Transactions on Fundamentals, E79-A(1):35-48, 1996.
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-A
, Issue.1
, pp. 35-48
-
-
Kusuda, K.1
Matsumoto, T.2
-
18
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
D. Boneh, editor, CRYPTO, of, Springer
-
P. Oechslin. Making a faster cryptanalytic time-memory trade-off. In D. Boneh, editor, CRYPTO, volume 2729 of Lecture Notes in Computer Science, pages 617-630. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 617-630
-
-
Oechslin, P.1
-
19
-
-
84949427555
-
-
M.-J. O. Saarinen. A time-memory tradeoff attack against lili-128. In J. Daemen and V. Rijmen, editors, FSE, 2365 of Lecture Notes in Computer Science, pages 231-236. Springer, 2002.
-
M.-J. O. Saarinen. A time-memory tradeoff attack against lili-128. In J. Daemen and V. Rijmen, editors, FSE, volume 2365 of Lecture Notes in Computer Science, pages 231-236. Springer, 2002.
-
-
-
-
20
-
-
21644485720
-
-
F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, and J.- D. Legat. A time-memory tradeoff using distinguished points: New analysis & fpga results. In B. S. K. Jr., Çetin Kaya Koç, and C. Paar, editors, CHES, 2523 of Lecture Notes in Computer Science, pages 593-609. Springer, 2002.
-
F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, and J.- D. Legat. A time-memory tradeoff using distinguished points: New analysis & fpga results. In B. S. K. Jr., Çetin Kaya Koç, and C. Paar, editors, CHES, volume 2523 of Lecture Notes in Computer Science, pages 593-609. Springer, 2002.
-
-
-
|