-
1
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory 26(4), 401-406 (1980)
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.4
, pp. 401-406
-
-
Hellman, M.1
-
3
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
In: Boneh, D. (ed.) Springer, Heidelberg
-
Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617-630. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 617-630
-
-
Oechslin, P.1
-
4
-
-
84937419430
-
Cryptanalytic time/memory/data tradeoffs for stream ciphers
-
In: Okamoto, T. (ed.) Springer, Heidelberg
-
Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1-13. Springer, Heidelberg (2000)
-
(2000)
ASIACRYPT 2000. LNCS
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
5
-
-
84974707207
-
Real time cryptanalysis of A5/1 on a PC
-
In: Schneier, B. (ed.) Springer, Heidelberg
-
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
FSE 2000. LNCS
, vol.1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
6
-
-
35248861711
-
Instant ciphertext-only cryptanalysis of GSM encrypted communication
-
In: Boneh, D. (ed.) Springer, Heidelberg
-
Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600-616. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 600-616
-
-
Barkan, E.1
Biham, E.2
Keller, N.3
-
7
-
-
84884807544
-
-
Presentation at 26C3
-
Nohl, K., Munaut, S.: Wideband GSM sniffing. Presentation at 26C3 (2010), http://events.ccc.de/congress/2010/Fahrplan/events/4208.en.html
-
(2010)
Wideband GSM Sniffing
-
-
Nohl, K.1
Munaut, S.2
-
8
-
-
84884871344
-
-
November
-
Nohl, K.: A5/1 decrypt website (November 2012), http://opensource.srlabs. de/projects/a51-decrypt/
-
(2012)
A5/1 Decrypt Website
-
-
Nohl, K.1
-
9
-
-
33646516173
-
A new cryptanalytic time-memory trade-off for stream ciphers
-
In: Yolum, p., Gungor, T., Gurgen, F., Ozturan, C. (eds.) Springer, Heidelberg
-
Erguler, I., Anarim, E.: A new cryptanalytic time-memory trade-off for stream ciphers. In: Yolum, p., Gungor, T., Gurgen, F., Ozturan, C. (eds.) ISCIS 2005. LNCS, vol. 3733, pp. 215-223. Springer, Heidelberg (2005)
-
(2005)
ISCIS 2005. LNCS
, vol.3733
, pp. 215-223
-
-
Erguler, I.1
Anarim, E.2
-
10
-
-
33749576843
-
Rigorous bounds on cryptanalytic time/Memory tradeoffs
-
In: Dwork, C. (ed.) Springer, Heidelberg
-
Barkan, E., Biham, E., Shamir, A.: Rigorous bounds on cryptanalytic time/Memory tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 1-21. Springer, Heidelberg (2006)
-
(2006)
CRYPTO 2006. LNCS
, vol.4117
, pp. 1-21
-
-
Barkan, E.1
Biham, E.2
Shamir, A.3
-
11
-
-
41549083388
-
Variants of the distinguished point method for cryptanalytic time memory trade-offs
-
In: Chen, L., Mu, Y., Susilo, W. (eds.) Springer, Heidelberg
-
Hong, J., Jeong, K.C., Kwon, E.Y., Lee, I.-S., Ma, D.: Variants of the distinguished point method for cryptanalytic time memory trade-offs. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 131-145. Springer, Heidelberg (2008)
-
(2008)
ISPEC 2008. LNCS
, vol.4991
, pp. 131-145
-
-
Hong, J.1
Jeong, K.C.2
Kwon, E.Y.3
Lee, I.-S.4
Ma, D.5
-
12
-
-
84884862676
-
-
Security and Protection of Information 2011
-
Krhovjak, J., Siler, O., Leyland, P., Kur, J.: TMTO attacks on stream ciphers theory and practice. Security and Protection of Information 2011 (2011)
-
(2011)
TMTO Attacks on Stream Ciphers Theory and Practice
-
-
Krhovjak, J.1
Siler, O.2
Leyland, P.3
Kur, J.4
-
13
-
-
84884855985
-
-
Presentation at HAR 2009
-
Nohl, K.: Cracking A5 GSM encryption. Presentation at HAR 2009 (2009), https://har2009.org/program/events/187.en.html
-
(2009)
Cracking A5 GSM Encryption
-
-
Nohl, K.1
-
15
-
-
77956876380
-
The cost of false alarms in Hellman and rainbow tradeoffs
-
Hong, J.: The cost of false alarms in Hellman and rainbow tradeoffs. Designs, Codes and Cryptography 57, 293-327 (2010)
-
(2010)
Designs, Codes and Cryptography
, vol.57
, pp. 293-327
-
-
Hong, J.1
-
16
-
-
84915939958
-
Random mapping statistics
-
In: Quisquater, J.-J., Vandewalle, J. (eds.) Springer, Heidelberg
-
Flajolet, P., Odlyzko, A.M.: Random mapping statistics. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 329-354. Springer, Heidelberg (1990)
-
(1990)
EUROCRYPT 1989. LNCS
, vol.434
, pp. 329-354
-
-
Flajolet, P.1
Odlyzko, A.M.2
-
17
-
-
33646849366
-
Rigorous time/space tradeoffs for inverting functions
-
ACM
-
Fiat, A., Naor, M.: Rigorous time/space tradeoffs for inverting functions. In: STOC 1991, pp. 534-541. ACM (1991)
-
(1991)
STOC 1991
, pp. 534-541
-
-
Fiat, A.1
Naor, M.2
|