Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude (Q3452354): Difference between revisions
From MaRDI portal
Created a new Item |
ReferenceBot (talk | contribs) Changed an Item |
||
(5 intermediate revisions by 4 users not shown) | |||
Property / author | |||
Property / author: Paul C. van Oorschot / rank | |||
Property / author | |||
Property / author: Paul C. van Oorschot / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/3-540-68697-5_18 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1756321105 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Time-memory-processor trade-offs / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3973158 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4279697 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A cryptanalytic time-memory trade-off / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4279670 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A monte carlo method for factorization / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Monte Carlo Methods for Index Computation (mod p) / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 02:08, 11 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude |
scientific article |
Statements
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude (English)
0 references
11 November 2015
0 references
meet-in-the-middle attack
0 references
parallel collision search
0 references
cryptanalysis
0 references
DES
0 references
low Hamming weight exponents
0 references