Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
From MaRDI portal
Publication:3582782
DOI10.1007/978-3-642-14623-7_35zbMath1283.94061OpenAlexW1575640061MaRDI QIDQ3582782
Anindya De, Madhur Tulsiani, Luca Trevisan
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_35
Related Items (30)
Simulating Auxiliary Inputs, Revisited ⋮ On the bit security of cryptographic primitives ⋮ Random oracles and non-uniformity ⋮ Analysis of Rainbow Tables with Fingerprints ⋮ Single-server private information retrieval with sublinear amortized time ⋮ The function-inversion problem: barriers and opportunities ⋮ On the optimal succinctness and efficiency of functional encryption and attribute-based encryption ⋮ On time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashing ⋮ Fully-secure MPC with minimal trust ⋮ On time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashing ⋮ Non-uniformity and quantum advice in the quantum random oracle model ⋮ Lower bounds for (batch) PIR with private preprocessing ⋮ Revisiting time-space tradeoffs for function inversion ⋮ The query-complexity of preprocessing attacks ⋮ Bit security as computational cost for winning games with high probability ⋮ New proofs for NMAC and HMAC: security without collision resistance ⋮ Time-space tradeoffs for sponge hashing: attacks and limitations for short collisions ⋮ Time-space lower bounds for finding collisions in Merkle-Damgård hash functions ⋮ Time-space lower bounds for finding collisions in Merkle-Damgård Hash functions ⋮ Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness ⋮ Unifying presampling via concentration bounds ⋮ Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives ⋮ On the Complexity of Breaking Pseudoentropy ⋮ Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU ⋮ Password hashing and preprocessing ⋮ Proofs of Catalytic Space ⋮ Cryptographic pseudorandom generators can make cryptosystems problematic ⋮ Time-space tradeoffs and short collisions in Merkle-Damgård hash functions ⋮ Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited ⋮ On the memory-tightness of hashed ElGamal
This page was built for publication: Time Space Tradeoffs for Attacks against One-Way Functions and PRGs