Publisher
Springer International Publishing
Reference16 articles.
1. Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theory 26(4), 401–406 (1980)
2. Lecture Notes in Computer Science;P Oechslin,2003
3. Denning, D.E.R.: Cryptography and Data Security, p. 100. Addison-Wesley Longman Publishing Co., Inc. (1982)
4. Lee, G.W., Hong, J.: Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms, vol. 80, pp. 473–523. Kluwer Academic Publishers (2016)
5. Hong, J., Moon, S.: A comparison of cryptanalytic tradeoff algorithms. J. Cryptol. 26, 559–637 (2013)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On time-memory trade-offs for password hashing schemes;Frontiers in Computer Science;2024-02-29
2. Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM;Lecture Notes in Computer Science;2024
3. Stairway To Rainbow;Proceedings of the ACM Asia Conference on Computer and Communications Security;2023-07-10
4. Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries;Forensic Science International: Digital Investigation;2023-03
5. Rainbow Tables: How Far Can CPU Go?;The Computer Journal;2022-10-28