Some Thoughts on Time-Memory-Data Tradeoffs
暂无分享,去创建一个
[1] Palash Sarkar,et al. Time memory tradeoff attacks on streamciphers , 2004 .
[2] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[3] Eli Biham,et al. How to decrypt or even substitute DES-encrypted messages in 228 steps , 2002, Inf. Process. Lett..
[4] Ingrid Verbauwhede,et al. Cracking Unix Passwords using FPGA Platforms , 2005 .
[5] Eli Biham,et al. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.
[6] S. Babbage. Improved “exhaustive search” attacks on stream ciphers , 1995 .
[7] Markku-Juhani O. Saarinen. A Time-Memory Tradeoff Attack Against LILI-128 , 2002, FSE.
[8] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[9] Jovan Dj. Golic,et al. Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.
[10] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[11] Palash Sarkar,et al. Rediscovery of Time Memory Tradeoffs , 2005, IACR Cryptol. ePrint Arch..