A cryptanalytic time-memory trade-off
From MaRDI portal
Publication:3877553
Recommendations
Cited in
(only showing first 100 items - show all)- Impact factors involved in cryptoperiod computation in key compromise impersonation scenario
- Espresso: a stream cipher for 5G wireless communication systems
- On parallel computations in implementation of the meat-in-the-middle attack
- Cryptanalysis of the ``Kindle cipher
- On the sets of images of \(k\)-fold iteration of uniform random mapping
- DES collisions revisited
- Memory-Efficient Algorithms for Finding Needles in Haystacks
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem
- Generic attacks on hash combiners
- Unifying presampling via concentration bounds
- scientific article; zbMATH DE number 1979312 (Why is no real title available?)
- Tighter bound for generalized multiple discrete logarithm problem via MDS matrix method
- A comparison of cryptanalytic tradeoff algorithms
- Some results on lightweight stream ciphers Fountain v1 \& lizard
- Key agreement schemes based on linear groupoids
- Исследование сложности метода радужных таблиц с маркерами цепочек
- New Distinguishers Based on Random Mappings against Stream Ciphers
- Proofs of space
- A Practical Attack on KeeLoq
- Loiss: A Byte-Oriented Stream Cipher
- Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
- Generic Attacks on Symmetric Ciphers
- An analysis of chain characteristics in the cryptanalytic TMTO method
- Optimal indexes for sparse bit vectors
- Succinct representations of permutations and functions
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Solving discrete logarithm problems faster with the aid of pre-computation
- Success probability of the Hellman trade-off
- Random oracles and non-uniformity
- On building fine-grained one-way functions from strong average-case hardness
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Optimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisions
- Non-uniformity and quantum advice in the quantum random oracle model
- New proofs for NMAC and HMAC: security without collision resistance
- Comparison of perfect table cryptanalytic tradeoff algorithms
- Flatness and structural analysis as a constructive framework for private communication
- An efficient collision detection method for computing discrete logarithms with Pollard's rho
- Асимптотическое поведение мощности полного прообраза образа случайного множества при итерациях отображений конечного множества
- Improving implementable meet-in-the-middle attacks by orders of magnitude
- Revisiting time-space tradeoffs for function inversion
- The query-complexity of preprocessing attacks
- A new algorithm for the unbalanced meet-in-the-middle problem
- Square reflection cryptanalysis of 5-round Feistel networks with permutations
- Estimates of the mean size of the subset image under composition of random mappings
- Security analysis of \textsc{Prince}
- A practical attack on KeeLoq
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
- Analysis of the perfect table fuzzy rainbow tradeoff
- Optimizing a password hashing function with hardware-accelerated symmetric encryption
- Quantum time/memory/data tradeoff attacks
- The full cost of cryptanalytic attacks
- scientific article; zbMATH DE number 1941130 (Why is no real title available?)
- Bootstrapping for approximate homomorphic encryption
- Distribution of the length of aperiodicity segment in the graph of \(k\)-fold iteration of uniform random mapping
- scientific article; zbMATH DE number 1618047 (Why is no real title available?)
- The Hash Function Family LAKE
- Efficient dissection of bicomposite problems with cryptanalytic applications
- Estimation of the characteristics of time-memory-data tradeoff methods via generating functions of the number of particles and the total number of particles in the Galton-Watson process
- The cost of false alarms in Hellman and rainbow tradeoffs
- On time-space lower bounds for finding short collisions in sponge hash functions
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- A highly secure stream cipher based on analog-digital hybrid chaotic system
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
- Differential cryptanalysis of DES-like cryptosystems
- Basing Weak Public-Key Cryptography on Strong One-Way Functions
- Panther: a sponge based lightweight authenticated encryption scheme
- Ciphertext expansion in limited-leakage order-preserving encryption: a tight computational lower bound
- A Meet-in-the-Middle Attack on 8-Round AES
- DES-GENERATED CHECKSUMS FOR ELECTRONIC SIGNATURES
- Time/memory/data tradeoffs for variants of the RSA problem
- Multi-key security: the Even-Mansour construction revisited
- Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack
- Probability to meet in the middle
- Key recovery attacks on iterated Even-Mansour encryption schemes
- An approach for stream ciphers design based on joint computing over random and secret data
- Ranks of ideals in inverse semigroups of difunctional binary relations
- The memory-tightness of authenticated encryption
- Analysis of the Parallel Distinguished Point Tradeoff
- On a probabilistic approach to the estimation of reliability of the Hellman method
- Distribution of the length of aperiodicity segment in the graph of independent uniform random mappings composition
- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- Improved Time-Memory Trade-Offs with Multiple Data
- Time-space lower bounds for finding collisions in Merkle-Damgård hash functions
- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
- Time-memory trade-off attack on the GSM A5/1 stream cipher using commodity GPGPU (extended abstract)
- On the mean value of the total length of chains computed during the additional checkings in the tradeoff method with distinguished points
- Mathematical problems in cryptology
- Cryptanalysis of MDC-2
- scientific article; zbMATH DE number 7301797 (Why is no real title available?)
- Is the data encryption standard a group? (Results of cycling experiments on DES)
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- New second-preimage attacks on hash functions
- A new decryption failure attack against HQC
- Fixing cracks in the concrete: random oracles with auxiliary input, revisited
- scientific article; zbMATH DE number 1504796 (Why is no real title available?)
- Analysis of rainbow tables with fingerprints
- Time-space lower bounds for finding collisions in Merkle-Damgård Hash functions
- On time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashing
- On time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashing
This page was built for publication: A cryptanalytic time-memory trade-off
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3877553)