Pages that link to "Item:Q5756640"
From MaRDI portal
The following pages link to Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs (Q5756640):
Displaying 28 items.
- A comparison of cryptanalytic tradeoff algorithms (Q380959) (← links)
- An analysis of chain characteristics in the cryptanalytic TMTO method (Q391319) (← links)
- New proofs for NMAC and HMAC: security without collision resistance (Q901373) (← links)
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers (Q963420) (← links)
- Success probability of the Hellman trade-off (Q976114) (← links)
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries (Q1629393) (← links)
- Beyond Hellman's time-memory trade-offs with applications to proofs of space (Q1703929) (← links)
- Some results on Fruit (Q1727353) (← links)
- The cost of false alarms in Hellman and rainbow tradeoffs (Q1960220) (← links)
- Tight time-space lower bounds for finding multiple collision pairs and their applications (Q2055617) (← links)
- Super-linear time-memory trade-offs for symmetric encryption (Q2119086) (← links)
- The function-inversion problem: barriers and opportunities (Q2175919) (← links)
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem (Q2188960) (← links)
- Tight time-memory trade-offs for symmetric encryption (Q2292656) (← links)
- Data-independent memory hard functions: new attacks and stronger constructions (Q2304996) (← links)
- Solving discrete logarithm problems faster with the aid of pre-computation (Q2322875) (← links)
- Analysis of the perfect table fuzzy rainbow tradeoff (Q2336696) (← links)
- Comparison of perfect table cryptanalytic tradeoff algorithms (Q2630712) (← links)
- Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU (Q2794508) (← links)
- Tradeoff Cryptanalysis of Memory-Hard Functions (Q2795993) (← links)
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks (Q2807196) (← links)
- Analysis of the Parallel Distinguished Point Tradeoff (Q3104733) (← links)
- Analysis of Rainbow Tables with Fingerprints (Q3194613) (← links)
- Исследование сложности метода радужных таблиц с маркерами цепочек (Q3381896) (← links)
- О предельных средних значениях в вероятностных моделях методов балансировки времени-памяти-данных (Q5152390) (← links)
- Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited (Q5267415) (← links)
- On time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashing (Q6083214) (← links)
- Quantum time/memory/data tradeoff attacks (Q6146595) (← links)