Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1759258 - MaRDI portal

scientific article; zbMATH DE number 1759258

From MaRDI portal
Publication:4537979

zbMath0994.68640MaRDI QIDQ4537979

Adi Shamir, Alex Biryukov, David Wagner

Publication date: 13 October 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (34)

Comparison of perfect table cryptanalytic tradeoff algorithmsCertain Observations on ACORN v3 and the Implications to TMDTO AttacksCryptanalysis of three mutually clock-controlled stop/go shift registersRevisit two memoryless state-recovery cryptanalysis methods on A5/1Analysis of Rainbow Tables with FingerprintsRefined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2О среднем значении суммарной длины цепочек, вычисляемых при дополнительных проверках в методе балансировки с особыми точкамиThe function-inversion problem: barriers and opportunitiesA comparison of cryptanalytic tradeoff algorithmsWeaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream CipherAn analysis of chain characteristics in the cryptanalytic TMTO methodCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemProvable security against generic attacks on stream ciphersGeneric cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephonyFinding Effective SAT Partitionings Via Black-Box OptimizationOn stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacksTreatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphersNew Distinguishers Based on Random Mappings against Stream CiphersInternal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attackTime–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPUReduced Complexity Attacks on the Alternating Step GeneratorTwo Trivial Attacks on TriviumPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksИсследование сложности метода радужных таблиц с маркерами цепочекОб одном теоретико-вероятностном подходе к обоснованию надежности метода ХеллманаInstant ciphertext-only cryptanalysis of GSM encrypted communicationParallel Logical Cryptanalysis of the Generator A5/1 in BNB-Grid SystemOn Related-Key Attacks and KASUMI: The Case of A5/3Analysis of the Parallel Distinguished Point TradeoffAnalysis of the perfect table fuzzy rainbow tradeoffComputation of edit probabilities and edit distances for the A5-type keystream generatorA fast correlation attack on LILI-128A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a







This page was built for publication: