A cryptanalytic time-memory trade-off

From MaRDI portal
Publication:3877553

DOI10.1109/TIT.1980.1056220zbMath0436.94016WikidataQ29036614 ScholiaQ29036614MaRDI QIDQ3877553

Martin Edward Hellman

Publication date: 1980

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)




Related Items (95)

Another Look at TightnessCiphertext expansion in limited-leakage order-preserving encryption: a tight computational lower boundComparison of perfect table cryptanalytic tradeoff algorithmsImproving Implementable Meet-in-the-Middle Attacks by Orders of MagnitudeRanks of ideals in inverse semigroups of difunctional binary relationsProofs of SpaceMulti-key Security: The Even-Mansour Construction RevisitedNew second-preimage attacks on hash functionsKey recovery attacks on iterated Even-Mansour encryption schemesRandom oracles and non-uniformityBootstrapping for approximate homomorphic encryptionAn approach for stream ciphers design based on joint computing over random and secret dataAnalysis of Rainbow Tables with FingerprintsIs the data encryption standard a group? (Results of cycling experiments on DES)Mathematical problems in cryptologyOn building fine-grained one-way functions from strong average-case hardnessО среднем значении суммарной длины цепочек, вычисляемых при дополнительных проверках в методе балансировки с особыми точкамиThe function-inversion problem: barriers and opportunitiesA comparison of cryptanalytic tradeoff algorithmsSecurity Analysis of PRINCEAn analysis of chain characteristics in the cryptanalytic TMTO methodGeneric attacks on hash combinersCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemEfficient detection of high probability statistical properties of cryptosystems via surrogate differentiationOptimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisionsOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingAn efficient collision detection method for computing discrete logarithms with Pollard's rhoSome results on lightweight stream ciphers Fountain v1 \& lizardStream Ciphers Using a Random Update Function: Study of the Entropy of the Inner StateA New Algorithm for the Unbalanced Meet-in-the-Middle ProblemOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingNon-uniformity and quantum advice in the quantum random oracle modelRevisiting time-space tradeoffs for function inversionThe query-complexity of preprocessing attacksQuantum time/memory/data tradeoff attacksA highly secure stream cipher based on analog-digital hybrid chaotic systemPanther: a sponge based lightweight authenticated encryption schemeNew proofs for NMAC and HMAC: security without collision resistanceTime-space tradeoffs for sponge hashing: attacks and limitations for short collisionsTime-space lower bounds for finding collisions in Merkle-Damgård hash functionsA practical attack on KeeLoqProvable security against generic attacks on stream ciphersTime-space lower bounds for finding collisions in Merkle-Damgård Hash functionsA new decryption failure attack against HQCGeneric cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128Unifying presampling via concentration boundsSuccinct representations of permutations and functionsThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherThe Hash Function Family LAKEA Meet-in-the-Middle Attack on 8-Round AESThe cost of false alarms in Hellman and rainbow tradeoffsSquare reflection cryptanalysis of 5-round Feistel networks with permutationsOptimal indexes for sparse bit vectorsFlatness and structural analysis as a constructive framework for private communicationLoiss: A Byte-Oriented Stream CipherEstimates of the mean size of the subset image under composition of random mappingsОценка характеристик методов балансировки времени-памяти-данных с помощью производящих функций числа частиц и общего числа частиц в процессе Гальтона - ВатсонаО предельных средних значениях в вероятностных моделях методов балансировки времени-памяти-данныхО криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012Limit theorem for the size of an image of subset under compositions of random mappingsEspresso: a stream cipher for 5G wireless communication systemsTreatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphersTrade-offs between communication throughput and parallel timeEfficient dissection of bicomposite problems with cryptanalytic applicationsSuccess probability of the Hellman trade-offNew Distinguishers Based on Random Mappings against Stream CiphersInternal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attackBasing Weak Public-Key Cryptography on Strong One-Way FunctionsTime–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPUImproved Meet-in-the-Middle Attacks on Reduced-Round DESA Practical Attack on KeeLoqPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksCryptanalysis of MDC-2Collisions and incidence of vertices and components in the graph of \(k\)-fold iteration of the uniform random mappingСхемы выработки общего ключа на основе линейных группоидовАсимптотическое поведение мощности полного прообраза образа случайного множества при итерациях отображений конечного множестваРаспределение длины отрезка апериодичности в графе $k$-кратной итерации случайного равновероятного отображенияИсследование сложности метода радужных таблиц с маркерами цепочекО множестве образов $k$-кратной итерации равновероятного случайного отображенияИспользование неассоциативных структур для построения алгоритмов открытого распределения ключейОб одном теоретико-вероятностном подходе к обоснованию надежности метода ХеллманаРаспределение длины отрезка апериодичности в графе композиции независимых равновероятных случайных отображенийTight time-space lower bounds for finding multiple collision pairs and their applicationsMemory-Efficient Algorithms for Finding Needles in HaystacksThe Symbiosis between Collision and Preimage ResistanceAnalysis of the Parallel Distinguished Point TradeoffSolving discrete logarithm problems faster with the aid of pre-computationUnnamed ItemAnalysis of the perfect table fuzzy rainbow tradeoffOptimizing a password hashing function with hardware-accelerated symmetric encryptionTime-space tradeoffs and short collisions in Merkle-Damgård hash functionsHow to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.Differential cryptanalysis of DES-like cryptosystemsFixing Cracks in the Concrete: Random Oracles with Auxiliary Input, RevisitedA state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a




This page was built for publication: A cryptanalytic time-memory trade-off