-
1
-
-
33646826194
-
Time-memory trade-offs: False alarm detection using checkpoints
-
Springer-Verlag, Heidelberg
-
Avoine G., Junod P., Oechslin P.: Time-memory trade-offs: false alarm detection using checkpoints. Indocrypt 2005. LNCS, vol. 3797, pp. 183-196. Springer-Verlag, Heidelberg (2005).
-
(2005)
Indocrypt 2005. LNCS
, vol.3797
, pp. 183-196
-
-
Avoine, G.1
Junod, P.2
Oechslin, P.3
-
2
-
-
49449086865
-
Characterization and improvement of time-memory trade-off based on perfect tables
-
22 (See also [1])
-
Avoine G., Junod P., Oechslin P.: Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inform. Syst. Secur. 11(4), 17:1-17:22 (2008), (See also [1]).
-
(2008)
ACM Trans. Inform. Syst. Secur.
, vol.11-17
, Issue.4
, pp. 1-17
-
-
Avoine, G.1
Junod, P.2
Oechslin, P.3
-
4
-
-
33749576843
-
Rigorous bounds on cryptanalytic time/memory tradeoffs
-
Springer-Verlag, Heidleberg
-
Barkan E., Biham E., Shamir A.: Rigorous bounds on cryptanalytic time/memory tradeoffs. Crypto 2006. LNCS, vol. 4117, pp. 1-21, Springer-Verlag, Heidleberg (2006).
-
(2006)
Crypto 2006. LNCS
, vol.4117
, pp. 1-21
-
-
Barkan, E.1
Biham, E.2
Shamir, A.3
-
5
-
-
33745626422
-
Improved time-memory trade-offs with multiple data
-
Springer-Verlag, Heidleberg
-
Biryukov A., Mukhopadhyay S., Sarkar P.: Improved time-memory trade-offs with multiple data. SAC 2005. LNCS, vol. 3897, pp. 110-127. Springer-Verlag, Heidleberg (2006).
-
(2006)
SAC 2005. LNCS
, vol.3897
, pp. 110-127
-
-
Biryukov, A.1
Mukhopadhyay, S.2
Sarkar, P.3
-
6
-
-
84937419430
-
Cryptanalytic time/memory/data tradeoffs for stream ciphers
-
Springer-Verlag, Heidleberg
-
Biryukov A., Shamir A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. Asiacrypt 2000. LNCS, vol. 1976, pp. 1-13. Springer-Verlag, Heidleberg (2000).
-
(2000)
Asiacrypt 2000. LNCS
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
7
-
-
0004238984
-
-
(p. 100, Ron Rivest's distinguished points observation). Addison-Wesley, Menlo Park (1982)
-
Denning D.E.: Cryptography and data security. (p. 100, Ron Rivest's distinguished points observation). Addison-Wesley, Menlo Park (1982).
-
Cryptography and Data Security
-
-
Denning, D.E.1
-
8
-
-
0033294770
-
Rigorous time/space tradeoffs for invering functions
-
10.1137/S0097539795280512 1740572
-
A. Fiat M. Naor 1999 Rigorous time/space tradeoffs for invering functions SIAM J. Comput. 29 3 790 803 10.1137/S0097539795280512 1740572
-
(1999)
SIAM J. Comput.
, vol.29
, Issue.3
, pp. 790-803
-
-
Fiat, A.1
Naor, M.2
-
9
-
-
84915939958
-
Random mapping statistics
-
Springer-Verlag, Heidleberg
-
Flajolet P., Odlyzko A.M.: Random mapping statistics. Eurocrypt 1989. LNCS, vol. 434, pp. 329-354. Springer-Verlag, Heidleberg (1990).
-
(1990)
Eurocrypt 1989. LNCS
, vol.434
, pp. 329-354
-
-
Flajolet, P.1
Odlyzko, A.M.2
-
10
-
-
84957381006
-
Cryptanalysis of alleged A5 stream cipher
-
Springer-Verlag, Heidleberg
-
Dj.Golić J.: Cryptanalysis of alleged A5 stream cipher. Eurocrypt 1997. LNCS, vol. 1233, pp. 239-255. Springer-Verlag, Heidleberg (1997).
-
(1997)
Eurocrypt 1997. LNCS
, vol.1233
, pp. 239-255
-
-
Golić, Dj.J.1
-
11
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
0436.94016 10.1109/TIT.1980.1056220 581786
-
M.E. Hellman 1980 A cryptanalytic time-memory trade-off IEEE Trans. on Inform. Theory 26 401 406 0436.94016 10.1109/TIT.1980.1056220 581786
-
(1980)
IEEE Trans. on Inform. Theory
, vol.26
, pp. 401-406
-
-
Hellman, M.E.1
-
12
-
-
41549083388
-
Variants of the distinguished point method for cryptanalytic time memory trade-offs
-
Springer-Verlag, Heidleberg
-
Hong J., Jeong K.C., Kwon E.Y., Lee I.-S., Ma D.: Variants of the distinguished point method for cryptanalytic time memory trade-offs. ISPEC 2008. LNCS, vol. 4991. Springer-Verlag, Heidleberg, pp. 131-145 (2008).
-
(2008)
ISPEC 2008. LNCS
, vol.4991
, pp. 131-145
-
-
Hong, J.1
Jeong, K.C.2
Kwon, E.Y.3
Lee, I.-S.4
Ma, D.5
-
13
-
-
0032680924
-
Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size
-
I.-J. Kim T. Matsumoto 1999 Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size IEICE Trans. Fundament. E82-A 123 129
-
(1999)
IEICE Trans. Fundament.
, vol.82
, pp. 123-129
-
-
Kim, I.-J.1
Matsumoto, T.2
-
16
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
Oechslin P.: Making a faster cryptanalytic time-memory trade-off. Crypto 2003. LNCS, vol. 2729, pp. 617-630 (2003).
-
(2003)
Crypto 2003. LNCS
, vol.2729
, pp. 617-630
-
-
Oechslin, P.1
|