|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 18 occurrences of 15 keywords
|
|
|
Results
Found 17 publication records. Showing 17 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
155 | Jin Hong 0001, Palash Sarkar 0001 |
New Applications of Time Memory Data Tradeoffs. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
time memory data tradeoff |
111 | Nurdan Buz Saran, Ali Doganaksoy |
Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
103 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
On the Effectiveness of TMTO and Exhaustive Search Attacks. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, one-way function |
89 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
Hardware architecture and trade-offs for generic inversion of one-way functions. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
66 | Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar 0001 |
Improved Time-Memory Trade-Offs with Multiple Data. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
time/memory/data trade-off, key sizes, block-cipher |
66 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
Application of LFSRs in Time/Memory Trade-Off Cryptanalysis. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
Time/memory trade-off, LFSR, rainbow table |
53 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
DES Cracker, TMTO, Counter Mode of Operation, LFSR |
44 | Jiali Choy, Khoongming Khoo, Chuan-Wen Loe |
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
time-memory-data trade-off, block cipher, meet-in-the-middle, triple DES |
44 | Palash Sarkar 0001 |
Generic Attacks on Symmetric Ciphers. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
|
36 | John Preuß Mattsson |
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
36 | John Preuß Mattsson |
Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal. |
CANS |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Violeta Tomasevic, Milo Tomasevic |
An analysis of chain characteristics in the cryptanalytic TMTO method. |
Theor. Comput. Sci. |
2013 |
DBLP DOI BibTeX RDF |
|
36 | Iman Saberi, Bahareh Shojaie, Mazleena Salleh, Mahan Niknafskermani, Mohammad Javad Rostami |
Preventing TMTO Attack in AES-CCMP in IEEE 802.11i. |
CN |
2012 |
DBLP DOI BibTeX RDF |
|
36 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
TMTO With Multiple Data: Analysis and New Single Table Trade-offs. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
31 | Meltem Sönmez Turan, Çagdas Çalik, Nurdan Buz Saran, Ali Doganaksoy |
New Distinguishers Based on Random Mappings against Stream Ciphers. |
SETA |
2008 |
DBLP DOI BibTeX RDF |
Random Mappings, TMTO Attacks, Stream Ciphers, Randomness tests |
22 | Jin Hong 0001, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma |
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
Hellman trade-off, distinguished points, time memory trade-off, rainbow table |
Displaying result #1 - #17 of 17 (100 per page; Change: )
|
|