New Applications of Time Memory Data Tradeoffs
From MaRDI portal
Publication:5451079
DOI10.1007/11593447_19zbMATH Open1154.68395OpenAlexW1565205193MaRDI QIDQ5451079FDOQ5451079
Authors: Jin Hong, Palash Sarkar
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_19
Recommendations
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- scientific article; zbMATH DE number 1583765
- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
- Improved Time-Memory Trade-Offs with Multiple Data
- A comparison of time-memory trade-off attacks on stream ciphers
Cited In (26)
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- A comparison of time-memory trade-off attacks on stream ciphers
- Revisiting Correlation-Immunity in Filter Generators
- Internal state recovery of espresso stream cipher using conditional sampling resistance and TMDTO attack
- Flaws in the Initialisation Process of Stream Ciphers
- Improved Time-Memory Trade-Offs with Multiple Data
- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
- Connecting tweakable and multi-key blockcipher security
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- A sponge-based PRF with good multi-user security
- Title not available (Why is that?)
- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher
- Time-memory-processor trade-offs
- Provable security against generic attacks on stream ciphers
- Multi-key Security: The Even-Mansour Construction Revisited
- A pseudorandom number generator based on worst-case lattice problems
- Another look at tightness
- Design and analysis of small-state grain-like stream ciphers
- Espresso: a stream cipher for 5G wireless communication systems
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
- Key recovery attacks on grain-like keystream generators with key injection
- New Distinguishers Based on Random Mappings against Stream Ciphers
- Loiss: A Byte-Oriented Stream Cipher
- Generic Attacks on Symmetric Ciphers
- KISS: a bit too simple
This page was built for publication: New Applications of Time Memory Data Tradeoffs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451079)