The full cost of cryptanalytic attacks
From MaRDI portal
Publication:1880405
zbMath1083.68051MaRDI QIDQ1880405
Publication date: 27 September 2004
Published in: Journal of Cryptology (Search for Journal in Brave)
CryptanalysisFactoringDiscrete logarithmDouble encryptionHash collisionMeet-in-the-middle attackNumber field sieveParallel collision searchTriple encryption
Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Factorization (11Y05)
Related Items (6)
The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3 ⋮ Comparison of perfect table cryptanalytic tradeoff algorithms ⋮ DAHash: distribution aware tuning of password hashing costs ⋮ Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more ⋮ Collisions for 70-Step SHA-1: On the Full Cost of Collision Search ⋮ Improved classical cryptanalysis of SIKE in practice
This page was built for publication: The full cost of cryptanalytic attacks