메뉴 건너뛰기




Volumn 7918 LNCS, Issue , 2013, Pages 406-423

A comparison of time-memory trade-off attacks on stream ciphers

Author keywords

[No Author keywords available]

Indexed keywords

COSTS; CRYPTOGRAPHY;

EID: 84884479923     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38553-7_24     Document Type: Conference Paper
Times cited : (11)

References (17)
  • 3
    • 35248858454 scopus 로고    scopus 로고
    • Making a faster cryptanalytic time-memory trade-off
    • In: Boneh, D. (ed.) Springer, Heidelberg
    • Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617-630. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003. LNCS , vol.2729 , pp. 617-630
    • Oechslin, P.1
  • 4
    • 84937419430 scopus 로고    scopus 로고
    • Cryptanalytic time/memory/data tradeoffs for stream ciphers
    • In: Okamoto, T. (ed.) Springer, Heidelberg
    • Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1-13. Springer, Heidelberg (2000)
    • (2000) ASIACRYPT 2000. LNCS , vol.1976 , pp. 1-13
    • Biryukov, A.1    Shamir, A.2
  • 5
    • 84974707207 scopus 로고    scopus 로고
    • Real time cryptanalysis of A5/1 on a PC
    • In: Schneier, B. (ed.) Springer, Heidelberg
    • Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) FSE 2000. LNCS , vol.1978 , pp. 1-18
    • Biryukov, A.1    Shamir, A.2    Wagner, D.3
  • 6
    • 35248861711 scopus 로고    scopus 로고
    • Instant ciphertext-only cryptanalysis of GSM encrypted communication
    • In: Boneh, D. (ed.) Springer, Heidelberg
    • Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600-616. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003. LNCS , vol.2729 , pp. 600-616
    • Barkan, E.1    Biham, E.2    Keller, N.3
  • 7
    • 84884807544 scopus 로고    scopus 로고
    • Presentation at 26C3
    • Nohl, K., Munaut, S.: Wideband GSM sniffing. Presentation at 26C3 (2010), http://events.ccc.de/congress/2010/Fahrplan/events/4208.en.html
    • (2010) Wideband GSM Sniffing
    • Nohl, K.1    Munaut, S.2
  • 8
    • 84884871344 scopus 로고    scopus 로고
    • November
    • Nohl, K.: A5/1 decrypt website (November 2012), http://opensource.srlabs. de/projects/a51-decrypt/
    • (2012) A5/1 Decrypt Website
    • Nohl, K.1
  • 9
    • 33646516173 scopus 로고    scopus 로고
    • A new cryptanalytic time-memory trade-off for stream ciphers
    • In: Yolum, p., Gungor, T., Gurgen, F., Ozturan, C. (eds.) Springer, Heidelberg
    • Erguler, I., Anarim, E.: A new cryptanalytic time-memory trade-off for stream ciphers. In: Yolum, p., Gungor, T., Gurgen, F., Ozturan, C. (eds.) ISCIS 2005. LNCS, vol. 3733, pp. 215-223. Springer, Heidelberg (2005)
    • (2005) ISCIS 2005. LNCS , vol.3733 , pp. 215-223
    • Erguler, I.1    Anarim, E.2
  • 10
    • 33749576843 scopus 로고    scopus 로고
    • Rigorous bounds on cryptanalytic time/Memory tradeoffs
    • In: Dwork, C. (ed.) Springer, Heidelberg
    • Barkan, E., Biham, E., Shamir, A.: Rigorous bounds on cryptanalytic time/Memory tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 1-21. Springer, Heidelberg (2006)
    • (2006) CRYPTO 2006. LNCS , vol.4117 , pp. 1-21
    • Barkan, E.1    Biham, E.2    Shamir, A.3
  • 11
    • 41549083388 scopus 로고    scopus 로고
    • Variants of the distinguished point method for cryptanalytic time memory trade-offs
    • In: Chen, L., Mu, Y., Susilo, W. (eds.) Springer, Heidelberg
    • Hong, J., Jeong, K.C., Kwon, E.Y., Lee, I.-S., Ma, D.: Variants of the distinguished point method for cryptanalytic time memory trade-offs. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 131-145. Springer, Heidelberg (2008)
    • (2008) ISPEC 2008. LNCS , vol.4991 , pp. 131-145
    • Hong, J.1    Jeong, K.C.2    Kwon, E.Y.3    Lee, I.-S.4    Ma, D.5
  • 13
    • 84884855985 scopus 로고    scopus 로고
    • Presentation at HAR 2009
    • Nohl, K.: Cracking A5 GSM encryption. Presentation at HAR 2009 (2009), https://har2009.org/program/events/187.en.html
    • (2009) Cracking A5 GSM Encryption
    • Nohl, K.1
  • 15
    • 77956876380 scopus 로고    scopus 로고
    • The cost of false alarms in Hellman and rainbow tradeoffs
    • Hong, J.: The cost of false alarms in Hellman and rainbow tradeoffs. Designs, Codes and Cryptography 57, 293-327 (2010)
    • (2010) Designs, Codes and Cryptography , vol.57 , pp. 293-327
    • Hong, J.1
  • 16
    • 84915939958 scopus 로고
    • Random mapping statistics
    • In: Quisquater, J.-J., Vandewalle, J. (eds.) Springer, Heidelberg
    • Flajolet, P., Odlyzko, A.M.: Random mapping statistics. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 329-354. Springer, Heidelberg (1990)
    • (1990) EUROCRYPT 1989. LNCS , vol.434 , pp. 329-354
    • Flajolet, P.1    Odlyzko, A.M.2
  • 17
    • 33646849366 scopus 로고
    • Rigorous time/space tradeoffs for inverting functions
    • ACM
    • Fiat, A., Naor, M.: Rigorous time/space tradeoffs for inverting functions. In: STOC 1991, pp. 534-541. ACM (1991)
    • (1991) STOC 1991 , pp. 534-541
    • Fiat, A.1    Naor, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.