메뉴 건너뛰기




Volumn 57, Issue 3, 2010, Pages 293-327

The cost of false alarms in Hellman and rainbow tradeoffs

Author keywords

Checkpoint; Hellman; Rainbow table; Time memory tradeoff

Indexed keywords

ERRORS; ITERATIVE METHODS;

EID: 77956876380     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-010-9368-x     Document Type: Article
Times cited : (17)

References (16)
  • 1
    • 33646826194 scopus 로고    scopus 로고
    • Time-memory trade-offs: False alarm detection using checkpoints
    • Springer-Verlag, Heidelberg
    • Avoine G., Junod P., Oechslin P.: Time-memory trade-offs: false alarm detection using checkpoints. Indocrypt 2005. LNCS, vol. 3797, pp. 183-196. Springer-Verlag, Heidelberg (2005).
    • (2005) Indocrypt 2005. LNCS , vol.3797 , pp. 183-196
    • Avoine, G.1    Junod, P.2    Oechslin, P.3
  • 2
    • 49449086865 scopus 로고    scopus 로고
    • Characterization and improvement of time-memory trade-off based on perfect tables
    • 22 (See also [1])
    • Avoine G., Junod P., Oechslin P.: Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inform. Syst. Secur. 11(4), 17:1-17:22 (2008), (See also [1]).
    • (2008) ACM Trans. Inform. Syst. Secur. , vol.11-17 , Issue.4 , pp. 1-17
    • Avoine, G.1    Junod, P.2    Oechslin, P.3
  • 4
    • 33749576843 scopus 로고    scopus 로고
    • Rigorous bounds on cryptanalytic time/memory tradeoffs
    • Springer-Verlag, Heidleberg
    • Barkan E., Biham E., Shamir A.: Rigorous bounds on cryptanalytic time/memory tradeoffs. Crypto 2006. LNCS, vol. 4117, pp. 1-21, Springer-Verlag, Heidleberg (2006).
    • (2006) Crypto 2006. LNCS , vol.4117 , pp. 1-21
    • Barkan, E.1    Biham, E.2    Shamir, A.3
  • 5
    • 33745626422 scopus 로고    scopus 로고
    • Improved time-memory trade-offs with multiple data
    • Springer-Verlag, Heidleberg
    • Biryukov A., Mukhopadhyay S., Sarkar P.: Improved time-memory trade-offs with multiple data. SAC 2005. LNCS, vol. 3897, pp. 110-127. Springer-Verlag, Heidleberg (2006).
    • (2006) SAC 2005. LNCS , vol.3897 , pp. 110-127
    • Biryukov, A.1    Mukhopadhyay, S.2    Sarkar, P.3
  • 6
    • 84937419430 scopus 로고    scopus 로고
    • Cryptanalytic time/memory/data tradeoffs for stream ciphers
    • Springer-Verlag, Heidleberg
    • Biryukov A., Shamir A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. Asiacrypt 2000. LNCS, vol. 1976, pp. 1-13. Springer-Verlag, Heidleberg (2000).
    • (2000) Asiacrypt 2000. LNCS , vol.1976 , pp. 1-13
    • Biryukov, A.1    Shamir, A.2
  • 7
    • 0004238984 scopus 로고    scopus 로고
    • (p. 100, Ron Rivest's distinguished points observation). Addison-Wesley, Menlo Park (1982)
    • Denning D.E.: Cryptography and data security. (p. 100, Ron Rivest's distinguished points observation). Addison-Wesley, Menlo Park (1982).
    • Cryptography and Data Security
    • Denning, D.E.1
  • 8
    • 0033294770 scopus 로고    scopus 로고
    • Rigorous time/space tradeoffs for invering functions
    • 10.1137/S0097539795280512 1740572
    • A. Fiat M. Naor 1999 Rigorous time/space tradeoffs for invering functions SIAM J. Comput. 29 3 790 803 10.1137/S0097539795280512 1740572
    • (1999) SIAM J. Comput. , vol.29 , Issue.3 , pp. 790-803
    • Fiat, A.1    Naor, M.2
  • 9
    • 84915939958 scopus 로고
    • Random mapping statistics
    • Springer-Verlag, Heidleberg
    • Flajolet P., Odlyzko A.M.: Random mapping statistics. Eurocrypt 1989. LNCS, vol. 434, pp. 329-354. Springer-Verlag, Heidleberg (1990).
    • (1990) Eurocrypt 1989. LNCS , vol.434 , pp. 329-354
    • Flajolet, P.1    Odlyzko, A.M.2
  • 10
    • 84957381006 scopus 로고    scopus 로고
    • Cryptanalysis of alleged A5 stream cipher
    • Springer-Verlag, Heidleberg
    • Dj.Golić J.: Cryptanalysis of alleged A5 stream cipher. Eurocrypt 1997. LNCS, vol. 1233, pp. 239-255. Springer-Verlag, Heidleberg (1997).
    • (1997) Eurocrypt 1997. LNCS , vol.1233 , pp. 239-255
    • Golić, Dj.J.1
  • 11
    • 0019038335 scopus 로고
    • A cryptanalytic time-memory trade-off
    • 0436.94016 10.1109/TIT.1980.1056220 581786
    • M.E. Hellman 1980 A cryptanalytic time-memory trade-off IEEE Trans. on Inform. Theory 26 401 406 0436.94016 10.1109/TIT.1980.1056220 581786
    • (1980) IEEE Trans. on Inform. Theory , vol.26 , pp. 401-406
    • Hellman, M.E.1
  • 12
    • 41549083388 scopus 로고    scopus 로고
    • Variants of the distinguished point method for cryptanalytic time memory trade-offs
    • Springer-Verlag, Heidleberg
    • Hong J., Jeong K.C., Kwon E.Y., Lee I.-S., Ma D.: Variants of the distinguished point method for cryptanalytic time memory trade-offs. ISPEC 2008. LNCS, vol. 4991. Springer-Verlag, Heidleberg, pp. 131-145 (2008).
    • (2008) ISPEC 2008. LNCS , vol.4991 , pp. 131-145
    • Hong, J.1    Jeong, K.C.2    Kwon, E.Y.3    Lee, I.-S.4    Ma, D.5
  • 13
    • 0032680924 scopus 로고    scopus 로고
    • Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size
    • I.-J. Kim T. Matsumoto 1999 Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size IEICE Trans. Fundament. E82-A 123 129
    • (1999) IEICE Trans. Fundament. , vol.82 , pp. 123-129
    • Kim, I.-J.1    Matsumoto, T.2
  • 16
    • 35248858454 scopus 로고    scopus 로고
    • Making a faster cryptanalytic time-memory trade-off
    • Oechslin P.: Making a faster cryptanalytic time-memory trade-off. Crypto 2003. LNCS, vol. 2729, pp. 617-630 (2003).
    • (2003) Crypto 2003. LNCS , vol.2729 , pp. 617-630
    • Oechslin, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.