Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs - MaRDI portal

Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs

From MaRDI portal
Publication:5756640

DOI10.1007/11818175_1zbMath1161.94384OpenAlexW1857473325MaRDI QIDQ5756640

Elad Barkan, Eli Biham, Adi Shamir

Publication date: 4 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11818175_1




Related Items (24)

Comparison of perfect table cryptanalytic tradeoff algorithmsAnalysis of Rainbow Tables with FingerprintsThe function-inversion problem: barriers and opportunitiesA comparison of cryptanalytic tradeoff algorithmsAn analysis of chain characteristics in the cryptanalytic TMTO methodCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingRevisiting time-space tradeoffs for function inversionQuantum time/memory/data tradeoff attacksNew proofs for NMAC and HMAC: security without collision resistanceTime-space tradeoffs for sponge hashing: attacks and limitations for short collisionsThe cost of false alarms in Hellman and rainbow tradeoffsSome results on FruitTreatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphersSuccess probability of the Hellman trade-offTime–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPUPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksИсследование сложности метода радужных таблиц с маркерами цепочекTight time-space lower bounds for finding multiple collision pairs and their applicationsAnalysis of the Parallel Distinguished Point TradeoffSolving discrete logarithm problems faster with the aid of pre-computationAnalysis of the perfect table fuzzy rainbow tradeoffFixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited




This page was built for publication: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs