-
1
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
10.1109/TIT.1980.1056220 MR581786 ZBL0436.94016
-
Hellman M. E., A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory 1980 26 4 401 406 10.1109/TIT.1980.1056220 MR581786 ZBL0436.94016
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.4
, pp. 401-406
-
-
Hellman, M.E.1
-
5
-
-
33749576843
-
Rigorous bounds on cryptanalytic time/memory tradeoffs
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Barkan E., Biham E., Shamir A., Rigorous bounds on cryptanalytic time/memory tradeoffs. Advances in Cryptology-CRYPTO 2006 2006 4117 Berlin, Germany Springer 1 21 Lecture Notes in Computer Science 10.1007/11818175-1 MR2422152 ZBL1161.94384 (Pubitemid 44532106)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4117
, pp. 1-21
-
-
Barkan, E.1
Biham, E.2
Shamir, A.3
-
6
-
-
80052290721
-
Attacking phone privacy
-
July 2010 Las Vegas, Nev, USA
-
Nohl K., Attacking phone privacy. Proceedings of the Black Hat USA July 2010 Las Vegas, Nev, USA
-
Proceedings of the Black Hat USA
-
-
Nohl, K.1
-
8
-
-
84884479923
-
A comparison of time-memory trade-off attacks on stream ciphers
-
Berlin, Germany Springer Lecture Notes in Computer Science 10.1007/978-3-642-38553-7-24 ZBL06172067
-
van den Broek F., Poll E., A comparison of time-memory trade-off attacks on stream ciphers. Progress in Cryptology-AFRICACRYPT 2013 2013 7918 Berlin, Germany Springer 406 423 Lecture Notes in Computer Science 10.1007/978-3-642- 38553-7-24 ZBL06172067
-
(2013)
Progress in Cryptology - AFRICACRYPT 2013
, vol.7918
, pp. 406-423
-
-
Van Den Broek, F.1
Poll, E.2
-
9
-
-
84884468775
-
Analysis of the non-perfect table fuzzy rainbow tradeoff
-
New York, NY, USA Springer Lecture Notes in Computer Science 10.1007/978-3-642-39059-3-24 ZBL06182578
-
Kim B. I., Hong J., Analysis of the non-perfect table fuzzy rainbow tradeoff. Information Security and Privacy 2013 7959 New York, NY, USA Springer 347 362 Lecture Notes in Computer Science 10.1007/978-3-642-39059-3-24 ZBL06182578
-
(2013)
Information Security and Privacy
, vol.7959
, pp. 347-362
-
-
Kim, B.I.1
Hong, J.2
-
10
-
-
33745626422
-
Improved time-memory trade-offs with multiple data
-
DOI 10.1007/11693383-8, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers
-
Biryukov A., Mukhopadhyay S., Sarkar P., Improved time-memory trade-offs with multiple data. Selected Areas in Cryptography 2006 3897 Berlin, Germany Springer 110 127 Lecture Notes in Computer Science 10.1007/11693383-8 MR2240993 ZBL1151.94481 (Pubitemid 43986789)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 3897
, pp. 110-127
-
-
Biryukov, A.1
Mukhopadhyay, S.2
Sarkar, P.3
-
11
-
-
84937419430
-
Cryptanalytic time/memory/data tradeoffs for stream ciphers
-
Berlin, Germany Springer Lecture Notes in Computer Science 10.1007/3-540-44448-3-1 MR1864318 ZBL0980.94013
-
Biryukov A., Shamir A., Cryptanalytic time/memory/data tradeoffs for stream ciphers. Advances in Cryptology-ASIACRYPT 2000 2000 1976 Berlin, Germany Springer 1 13 Lecture Notes in Computer Science 10.1007/3-540-44448-3-1 MR1864318 ZBL0980.94013
-
(2000)
Advances in Cryptology - ASIACRYPT 2000
, vol.1976
, pp. 1-13
-
-
Biryukov, A.1
Shamir, A.2
-
12
-
-
84890439294
-
A comparison of cryptanalytic tradeoff algorithms
-
10.1007/s00145-012-9128-3 MR3097109 ZBL1283.94069
-
Hong J., Moon S., A comparison of cryptanalytic tradeoff algorithms. Journal of Cryptology 2013 26 4 559 637 10.1007/s00145-012-9128-3 MR3097109 ZBL1283.94069
-
(2013)
Journal of Cryptology
, vol.26
, Issue.4
, pp. 559-637
-
-
Hong, J.1
Moon, S.2
-
13
-
-
84875175221
-
A comparison of perfect table cryptanalytic tradeoff algorithms
-
Lee G. W., Hong J., A comparison of perfect table cryptanalytic tradeoff algorithms. Cryptology ePrint Archive 2012 2012/540
-
(2012)
Cryptology EPrint Archive
, pp. 2012540
-
-
Lee, G.W.1
Hong, J.2
-
14
-
-
49449086865
-
Characterization and improvement of time-memory trade-off based on perfect tables
-
ARTICLE 17 Preliminary version presented at INDOCRYPT 2005 2-s2.0-49449086865 10.1145/1380564.1380565
-
Avoine G., Junod P., Oechslin P., Characterization and improvement of time-memory trade-off based on perfect tables. ACM Transactions on Information and System Security 2008 11 4, article 17 1 17. Preliminary version presented at INDOCRYPT 2005 2-s2.0-49449086865 10.1145/1380564.1380565
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.4
, pp. 1-17
-
-
Avoine, G.1
Junod, P.2
Oechslin, P.3
-
15
-
-
84974707207
-
Real Time Cryptanalysis of A5/1 on a PC
-
Fast Software Encryption
-
Biryukov A., Shamir A., Wagner D., Real time cryptanalysis of A5/1 on a PC. Fast Software Encryption 2001 1978 Berlin, Germany Springer 1 18 Lecture Notes in Computer Science (Pubitemid 33236937)
-
(2001)
Lecture Notes In Computer Science
, Issue.1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
17
-
-
21644485720
-
A time-memory tradeoff using distinguished points: New analysis & FPGA results
-
Standaert F.-X., Rouvroy G., Quisquater J.-J., Legat J.-D., A time-memory tradeoff using distinguished points: new analysis & FPGA results. Cryptographic Hardware and Embedded Systems-CHES 2002 2002 2523 Berlin, Germany Springer 593 609 Lecture Notes in Computer Science ZBL1020.94526 (Pubitemid 137638963)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2523
, pp. 593-609
-
-
Standaert, F.-X.1
Rouvroy, G.2
Quisquater, J.-J.3
Legat, J.-D.4
-
18
-
-
84884476122
-
Analysis of the non-perfect table fuzzy rainbow tradeoff
-
Kim B. I., Hong J., Analysis of the non-perfect table fuzzy rainbow tradeoff. Cryptology ePrint Archive 2012 2012/612
-
(2012)
Cryptology EPrint Archive
, pp. 2012612
-
-
Kim, B.I.1
Hong, J.2
|