Time-memory-processor trade-offs
From MaRDI portal
Publication:3796743
DOI10.1109/18.6030zbMath0651.68047OpenAlexW2062518666MaRDI QIDQ3796743
Hamid R. Amirazizi, Martin Edward Hellman
Publication date: 1988
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/4f3d9d64e4881979cbf0c4db3b154cd8e4d0e80f
cryptanalysisparallel processingknapsackexhaustive searchmultiple encryptiontime-memory trade-offssorting/switching network
Analysis of algorithms and problem complexity (68Q25) Searching and sorting (68P10) Cryptography (94A60)
Related Items
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude ⋮ Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU