New Applications of Time Memory Data Tradeoffs
From MaRDI portal
Publication:5451079
Recommendations
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- scientific article; zbMATH DE number 1583765
- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
- Improved Time-Memory Trade-Offs with Multiple Data
- A comparison of time-memory trade-off attacks on stream ciphers
Cited in
(27)- Provable security against generic attacks on stream ciphers
- Revisiting Correlation-Immunity in Filter Generators
- Improved Time-Memory Trade-Offs with Multiple Data
- New Distinguishers Based on Random Mappings against Stream Ciphers
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- A sponge-based PRF with good multi-user security
- KISS: a bit too simple
- Another look at tightness
- Connecting tweakable and multi-key blockcipher security
- Design and analysis of small-state grain-like stream ciphers
- Time-memory-processor trade-offs
- Key recovery attacks on grain-like keystream generators with key injection
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- A pseudorandom number generator based on worst-case lattice problems
- scientific article; zbMATH DE number 1583765 (Why is no real title available?)
- Multi-key security: the Even-Mansour construction revisited
- Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack
- A comparison of time-memory trade-off attacks on stream ciphers
- Espresso: a stream cipher for 5G wireless communication systems
- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
- Distributed time-memory tradeoff attacks on ciphers (with application to stream ciphers and counter mode)
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- Loiss: A Byte-Oriented Stream Cipher
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Flaws in the initialisation process of stream ciphers
- Generic Attacks on Symmetric Ciphers
- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher
This page was built for publication: New Applications of Time Memory Data Tradeoffs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451079)