A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack
暂无分享,去创建一个
Zhenqi Li | Bin Zhang | Dongdai Lin | Wenhao Wang | Yao Lu
[1] A. Maximov,et al. Fast computation of large distributions and its cryptographic applications , 2005 .
[2] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[3] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[4] Adi Shamir,et al. Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems , 2012, CRYPTO.
[5] Hwei-Ming Ying,et al. A Novel Rainbow Table Sorting Method , 2011 .
[6] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[7] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[8] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[9] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[10] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[11] Pascal Junod,et al. Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables , 2008, TSEC.
[12] Vrizlynn L. L. Thing,et al. A novel time-memory trade-off method for password recovery , 2009 .
[13] Jin Hong,et al. Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version) , 2008, IACR Cryptol. ePrint Arch..
[14] Palash Sarkar,et al. New Applications of Time Memory Data Tradeoffs , 2005, ASIACRYPT.
[15] Alex Biryukov,et al. Improved Time-Memory Trade-Offs with Multiple Data , 2005, Selected Areas in Cryptography.
[16] Jean-Didier Legat,et al. A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results , 2002, CHES.
[17] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .