scientific article; zbMATH DE number 1759258
From MaRDI portal
Publication:4537979
zbMath0994.68640MaRDI QIDQ4537979
Adi Shamir, Alex Biryukov, David Wagner
Publication date: 13 October 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99)
Related Items (34)
Comparison of perfect table cryptanalytic tradeoff algorithms ⋮ Certain Observations on ACORN v3 and the Implications to TMDTO Attacks ⋮ Cryptanalysis of three mutually clock-controlled stop/go shift registers ⋮ Revisit two memoryless state-recovery cryptanalysis methods on A5/1 ⋮ Analysis of Rainbow Tables with Fingerprints ⋮ Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 ⋮ О среднем значении суммарной длины цепочек, вычисляемых при дополнительных проверках в методе балансировки с особыми точками ⋮ The function-inversion problem: barriers and opportunities ⋮ A comparison of cryptanalytic tradeoff algorithms ⋮ Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher ⋮ An analysis of chain characteristics in the cryptanalytic TMTO method ⋮ Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem ⋮ Provable security against generic attacks on stream ciphers ⋮ Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ Finding Effective SAT Partitionings Via Black-Box Optimization ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers ⋮ New Distinguishers Based on Random Mappings against Stream Ciphers ⋮ Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack ⋮ Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU ⋮ Reduced Complexity Attacks on the Alternating Step Generator ⋮ Two Trivial Attacks on Trivium ⋮ Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks ⋮ Исследование сложности метода радужных таблиц с маркерами цепочек ⋮ Об одном теоретико-вероятностном подходе к обоснованию надежности метода Хеллмана ⋮ Instant ciphertext-only cryptanalysis of GSM encrypted communication ⋮ Parallel Logical Cryptanalysis of the Generator A5/1 in BNB-Grid System ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ Analysis of the Parallel Distinguished Point Tradeoff ⋮ Analysis of the perfect table fuzzy rainbow tradeoff ⋮ Computation of edit probabilities and edit distances for the A5-type keystream generator ⋮ A fast correlation attack on LILI-128 ⋮ A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
This page was built for publication: