-
2
-
-
84884497342
-
-
L0phtCrack, L0phtCrack 6, http://www.l0phtcrack.com/
-
L0phtCrack 6
-
-
-
3
-
-
84884491489
-
-
Objectif Sécurité
-
Objectif Sécurité, Ophcrack, http://ophcrack.sourceforge. net/
-
-
-
-
5
-
-
49449086865
-
Characterization and improvement of timememory trade-off based on perfect tables
-
Avoine, G., Junod, P., Oechslin, P.: Characterization and improvement of timememory trade-off based on perfect tables. ACM Trans. Inform. Syst. Secur. 11(4), 17:1-17:22 (2008);
-
(2008)
ACM Trans. Inform. Syst. Secur.
, vol.11
, Issue.4
-
-
Avoine, G.1
Junod, P.2
Oechslin, P.3
-
6
-
-
84884469632
-
-
Preliminary version presented at
-
Preliminary version presented at INDOCRYPT 2005
-
(2005)
INDOCRYPT
-
-
-
7
-
-
33749579842
-
-
Ph.D. Thesis, Technion - Israel Institute of Technology March
-
Barkan, E.P.: Cryptanalysis of Ciphers and Protocols. Ph.D. Thesis, Technion - Israel Institute of Technology (March 2006)
-
(2006)
Cryptanalysis of Ciphers and Protocols
-
-
Barkan, E.P.1
-
8
-
-
35248861711
-
Instant ciphertext-only cryptanalysis of GSM encrypted communication
-
Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600-616. Springer, Heidelberg (2003) (Pubitemid 137636966)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 600-616
-
-
Barkan, E.1
Biham, E.2
Keller, N.3
-
9
-
-
33749576843
-
Rigorous bounds on cryptanalytic time/memory tradeoffs
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Barkan, E., Biham, E., Shamir, A.: Rigorous bounds on cryptanalytic time/Memory tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 1-21. Springer, Heidelberg (2006) (Pubitemid 44532106)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 1-21
-
-
Barkan, E.1
Biham, E.2
Shamir, A.3
-
10
-
-
33745626422
-
Improved time-memory trade-offs with multiple data
-
DOI 10.1007/11693383-8, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers
-
Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved time-memory trade-offs with multiple data. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 110-127. Springer, Heidelberg (2006) (Pubitemid 43986789)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3897 LNCS
, pp. 110-127
-
-
Biryukov, A.1
Mukhopadhyay, S.2
Sarkar, P.3
-
11
-
-
84937419430
-
Cryptanalytic time/memory/data tradeoffs for stream ciphers
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1-13. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
12
-
-
84974707207
-
Real time cryptanalysis of A5/1 on a PC
-
Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
-
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
16
-
-
84957381006
-
Cryptanalysis of alleged A5 stream cipher
-
Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Golić, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239-255. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 239-255
-
-
Golić, J.D.1
-
17
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Trans. on Infor. Theory 26, 401-406 (1980)
-
(1980)
IEEE Trans. on Infor. Theory
, vol.26
, pp. 401-406
-
-
Hellman, M.E.1
-
18
-
-
83755167984
-
Analysis of the parallel distinguished point tradeoff
-
Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. Springer, Heidelberg
-
Hong, J., Lee, G.W., Ma, D.: Analysis of the parallel distinguished point tradeoff. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol. 7107, pp. 161-180. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7107
, pp. 161-180
-
-
Hong, J.1
Lee, G.W.2
Ma, D.3
-
19
-
-
84890439294
-
A comparison of cryptanalytic tradeoff algorithms
-
To appear in
-
Hong, J., Moon, S.: A comparison of cryptanalytic tradeoff algorithms. To appear in J. Cryptology, http://dx.doi.org/10.1007/s00145-012-9128-3
-
J. Cryptology
-
-
Hong, J.1
Moon, S.2
-
20
-
-
84884476122
-
Analysis of the non-perfect table fuzzy rainbow tradeoff
-
Report 2012/612, version 20121116:123317
-
Kim, B.-I., Hong, J.: Analysis of the non-perfect table fuzzy rainbow tradeoff. IACR Cryptology ePrint Archive, Report 2012/612, version 20121116:123317 (2012)
-
(2012)
IACR Cryptology ePrint Archive
-
-
Kim, B.-I.1
Hong, J.2
-
21
-
-
84875175221
-
A comparison of perfect table cryptanalytic tradeoff algorithms
-
Report 2012/540
-
Lee, G.W., Hong, J.: A comparison of perfect table cryptanalytic tradeoff algorithms. IACR Cryptology ePrint Archive, Report 2012/540 (2012)
-
(2012)
IACR Cryptology ePrint Archive
-
-
Lee, G.W.1
Hong, J.2
-
24
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617-630. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 617-630
-
-
Oechslin, P.1
-
25
-
-
21644485720
-
A time-memory tradeoff using distinguished points: New analysis & FPGA results
-
Standaert, F.-X., Rouvroy, G., Quisquater, J.-J., Legat, J.-D.: A time-memory tradeoff using distinguished points: New analysis & FPGA results. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 593-609. Springer, Heidelberg (2003) (Pubitemid 137638963)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2523
, pp. 593-609
-
-
Standaert, F.-X.1
Rouvroy, G.2
Quisquater, J.-J.3
Legat, J.-D.4
-
26
-
-
84884479923
-
A comparison of time-memory trade-off attacks on stream ciphers
-
Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. Springer, Heidelberg
-
van den Broek, F., Poll, E.: A comparison of time-memory trade-off attacks on stream ciphers. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 406-423. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7918
, pp. 406-423
-
-
Van Den Broek, F.1
Poll, E.2
|