Analysis of Rainbow Tables with Fingerprints
From MaRDI portal
Publication:3194613
DOI10.1007/978-3-319-19962-7_21zbMath1368.94084OpenAlexW1895973578MaRDI QIDQ3194613
Adrien Bourgeois, Xavier Carpent, Gildas Avoine
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_21
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The cost of false alarms in Hellman and rainbow tradeoffs
- Comparison of perfect table cryptanalytic tradeoff algorithms
- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System
- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
- A cryptanalytic time-memory trade-off
- Improved Time-Memory Trade-Offs with Multiple Data
- Advances in Cryptology - CRYPTO 2003
- Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints
- Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
This page was built for publication: Analysis of Rainbow Tables with Fingerprints