메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

Analysis of the perfect table fuzzy rainbow tradeoff

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84903643084     PISSN: 1110757X     EISSN: 16870042     Source Type: Journal    
DOI: 10.1155/2014/765394     Document Type: Article
Times cited : (5)

References (18)
  • 1
    • 0019038335 scopus 로고
    • A cryptanalytic time-memory trade-off
    • 10.1109/TIT.1980.1056220 MR581786 ZBL0436.94016
    • Hellman M. E., A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory 1980 26 4 401 406 10.1109/TIT.1980.1056220 MR581786 ZBL0436.94016
    • (1980) IEEE Transactions on Information Theory , vol.26 , Issue.4 , pp. 401-406
    • Hellman, M.E.1
  • 6
  • 8
    • 84884479923 scopus 로고    scopus 로고
    • A comparison of time-memory trade-off attacks on stream ciphers
    • Berlin, Germany Springer Lecture Notes in Computer Science 10.1007/978-3-642-38553-7-24 ZBL06172067
    • van den Broek F., Poll E., A comparison of time-memory trade-off attacks on stream ciphers. Progress in Cryptology-AFRICACRYPT 2013 2013 7918 Berlin, Germany Springer 406 423 Lecture Notes in Computer Science 10.1007/978-3-642- 38553-7-24 ZBL06172067
    • (2013) Progress in Cryptology - AFRICACRYPT 2013 , vol.7918 , pp. 406-423
    • Van Den Broek, F.1    Poll, E.2
  • 9
    • 84884468775 scopus 로고    scopus 로고
    • Analysis of the non-perfect table fuzzy rainbow tradeoff
    • New York, NY, USA Springer Lecture Notes in Computer Science 10.1007/978-3-642-39059-3-24 ZBL06182578
    • Kim B. I., Hong J., Analysis of the non-perfect table fuzzy rainbow tradeoff. Information Security and Privacy 2013 7959 New York, NY, USA Springer 347 362 Lecture Notes in Computer Science 10.1007/978-3-642-39059-3-24 ZBL06182578
    • (2013) Information Security and Privacy , vol.7959 , pp. 347-362
    • Kim, B.I.1    Hong, J.2
  • 11
    • 84937419430 scopus 로고    scopus 로고
    • Cryptanalytic time/memory/data tradeoffs for stream ciphers
    • Berlin, Germany Springer Lecture Notes in Computer Science 10.1007/3-540-44448-3-1 MR1864318 ZBL0980.94013
    • Biryukov A., Shamir A., Cryptanalytic time/memory/data tradeoffs for stream ciphers. Advances in Cryptology-ASIACRYPT 2000 2000 1976 Berlin, Germany Springer 1 13 Lecture Notes in Computer Science 10.1007/3-540-44448-3-1 MR1864318 ZBL0980.94013
    • (2000) Advances in Cryptology - ASIACRYPT 2000 , vol.1976 , pp. 1-13
    • Biryukov, A.1    Shamir, A.2
  • 12
    • 84890439294 scopus 로고    scopus 로고
    • A comparison of cryptanalytic tradeoff algorithms
    • 10.1007/s00145-012-9128-3 MR3097109 ZBL1283.94069
    • Hong J., Moon S., A comparison of cryptanalytic tradeoff algorithms. Journal of Cryptology 2013 26 4 559 637 10.1007/s00145-012-9128-3 MR3097109 ZBL1283.94069
    • (2013) Journal of Cryptology , vol.26 , Issue.4 , pp. 559-637
    • Hong, J.1    Moon, S.2
  • 13
    • 84875175221 scopus 로고    scopus 로고
    • A comparison of perfect table cryptanalytic tradeoff algorithms
    • Lee G. W., Hong J., A comparison of perfect table cryptanalytic tradeoff algorithms. Cryptology ePrint Archive 2012 2012/540
    • (2012) Cryptology EPrint Archive , pp. 2012540
    • Lee, G.W.1    Hong, J.2
  • 14
    • 49449086865 scopus 로고    scopus 로고
    • Characterization and improvement of time-memory trade-off based on perfect tables
    • ARTICLE 17 Preliminary version presented at INDOCRYPT 2005 2-s2.0-49449086865 10.1145/1380564.1380565
    • Avoine G., Junod P., Oechslin P., Characterization and improvement of time-memory trade-off based on perfect tables. ACM Transactions on Information and System Security 2008 11 4, article 17 1 17. Preliminary version presented at INDOCRYPT 2005 2-s2.0-49449086865 10.1145/1380564.1380565
    • (2008) ACM Transactions on Information and System Security , vol.11 , Issue.4 , pp. 1-17
    • Avoine, G.1    Junod, P.2    Oechslin, P.3
  • 15
    • 84974707207 scopus 로고    scopus 로고
    • Real Time Cryptanalysis of A5/1 on a PC
    • Fast Software Encryption
    • Biryukov A., Shamir A., Wagner D., Real time cryptanalysis of A5/1 on a PC. Fast Software Encryption 2001 1978 Berlin, Germany Springer 1 18 Lecture Notes in Computer Science (Pubitemid 33236937)
    • (2001) Lecture Notes In Computer Science , Issue.1978 , pp. 1-18
    • Biryukov, A.1    Shamir, A.2    Wagner, D.3
  • 18
    • 84884476122 scopus 로고    scopus 로고
    • Analysis of the non-perfect table fuzzy rainbow tradeoff
    • Kim B. I., Hong J., Analysis of the non-perfect table fuzzy rainbow tradeoff. Cryptology ePrint Archive 2012 2012/612
    • (2012) Cryptology EPrint Archive , pp. 2012612
    • Kim, B.I.1    Hong, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.