-
1
-
-
49449086865
-
Characterization and improvement of time-memory trade-off based on perfect tables
-
Preliminary version presented at INDOCRYPT 2005
-
Avoine, G., Junod, P., Oechslin, P.: Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inform. Syst. Secur., 11(4), 17:1-17:22 (2008); Preliminary version presented at INDOCRYPT 2005
-
(2008)
ACM Trans. Inform. Syst. Secur.
, vol.11
, Issue.4
-
-
Avoine, G.1
Junod, P.2
Oechslin, P.3
-
4
-
-
33749576843
-
Rigorous bounds on cryptanalytic time/memory tradeoffs
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Barkan, E., Biham, E., Shamir, A.: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 1-21. Springer, Heidelberg (2006) (Pubitemid 44532106)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 1-21
-
-
Barkan, E.1
Biham, E.2
Shamir, A.3
-
5
-
-
84937419430
-
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1-13. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
6
-
-
84974707207
-
Real Time Cryptanalysis of A5/1 on a PC
-
Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
-
Biryukov, A., Shamir, A., Wagner, D.: Real Time Cryptanalysis of A5/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
8
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Trans. on Infor. Theory 26, pp. 401-406 (1980)
-
(1980)
IEEE Trans. on Infor. Theory
, vol.26
, pp. 401-406
-
-
Hellman, M.E.1
-
10
-
-
77956876380
-
The cost of false alarms in Hellman and rainbow tradeoffs
-
Hong, J.: The cost of false alarms in Hellman and rainbow tradeoffs. Des. Codes Cryptogr. 57(3), 293-327 (2010)
-
(2010)
Des. Codes Cryptogr.
, vol.57
, Issue.3
, pp. 293-327
-
-
Hong, J.1
-
11
-
-
83755184610
-
Analysis of the Parallel Distinguished Point Tradeoff
-
Report 2011/387
-
Hong, J., Lee, G.W., Ma, D.: Analysis of the Parallel Distinguished Point Tradeoff. Cryptology ePrint Archive. Report 2011/387
-
Cryptology EPrint Archive
-
-
Hong, J.1
Lee, G.W.2
Ma, D.3
-
12
-
-
83755184609
-
A comparison of cryptanalytic tradeoff algorithms
-
Report 2010/176
-
Hong, J., Moon, S.: A comparison of cryptanalytic tradeoff algorithms. Cryptology ePrint Archive. Report 2010/176
-
Cryptology EPrint Archive
-
-
Hong, J.1
Moon, S.2
-
13
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
ACM
-
Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM CCS, pp. 364-372. ACM (2005)
-
(2005)
Proceedings of the 12th ACM CCS
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
14
-
-
35248858454
-
Making a Faster Cryptanalytic Time-Memory Trade-Off
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Oechslin, P.: Making a Faster Cryptanalytic Time-Memory Trade-Off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617-630. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 617-630
-
-
Oechslin, P.1
-
15
-
-
83755184606
-
Random Graphs in Security and Privacy
-
Invited talk at
-
Shamir, A.: Random Graphs in Security and Privacy. Invited talk at ICITS 2009 (2009)
-
(2009)
ICITS 2009
-
-
Shamir, A.1
-
16
-
-
21644485720
-
A time-memory tradeoff using distinguished points: New analysis & FPGA results
-
Standaert, F.-X., Rouvroy, G., Quisquater, J.-J., Legat, J.-D.: A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 593-609. Springer, Heidelberg (2003) (Pubitemid 137638963)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2523
, pp. 593-609
-
-
Standaert, F.-X.1
Rouvroy, G.2
Quisquater, J.-J.3
Legat, J.-D.4
|