Improved Time-Memory Trade-Offs with Multiple Data
暂无分享,去创建一个
[1] Ingrid Verbauwhede,et al. Cracking Unix Passwords using FPGA Platforms , 2005 .
[2] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[3] Jean-Didier Legat,et al. A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation , 2002, FPL.
[4] Eli Biham,et al. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials , 1999 .
[5] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[6] Markku-Juhani O. Saarinen. A Time-Memory Tradeoff Attack Against LILI-128 , 2002, FSE.
[7] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[8] Palash Sarkar,et al. Time memory tradeoff attacks on streamciphers , 2004 .
[9] Eli Biham,et al. How to Forge DES-Encrypted Messages in $2^{28}$ Steps , 1996 .
[10] S. Babbage. Improved “exhaustive search” attacks on stream ciphers , 1995 .
[11] Jovan Dj. Golic,et al. Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.
[12] Eli Biham,et al. How to decrypt or even substitute DES-encrypted messages in 228 steps , 2002, Inf. Process. Lett..
[13] Palash Sarkar,et al. Rediscovery of Time Memory Tradeoffs , 2005, IACR Cryptol. ePrint Arch..