A cryptanalytic time-memory trade-off

M Hellman - IEEE transactions on Information Theory, 1980 - ieeexplore.ieee.org
… K from f(K) is equivalent to cryptanalysis. If the cryptosystem is secure, f is therefore a one-way
function [3]. The time-memory trade-off described in this paper applies to inverting any one…

Making a faster cryptanalytic time-memory trade-off

P Oechslin - Advances in Cryptology-CRYPTO 2003: 23rd Annual …, 2003 - Springer
… In 1980 Martin Hellman described a cryptanalytic timememory trade-off which reduces
the time of cryptanalysis by using precalculated data stored in memory. This technique was …

Cryptanalytic Time-Memory Trade-Off

D Leblanc-Albarel - 2023 - hal.science
… This thesis focuses on a tool used by cryptanalysts: Cryptanalytic Time Memory Trade-Offs
(TMTOs). Cryptanalysts last resort is the brute-force attack (an exhaustive search), which …

Rigorous bounds on cryptanalytic time/memory tradeoffs

E Barkan, E Biham, A Shamir - Annual International Cryptology …, 2006 - Springer
… In this paper we formalize a general model of cryptanalytic time/memory tradeoffs, which
includes all the known schemes (and many new schemes). In this model, the preprocessing …

Cryptanalytic timememory trade-off for password hashing schemes

D Chang, A Jati, S Mishra, SK Sanadhya - International Journal of …, 2019 - Springer
… It would be interesting to apply our proposed timememory trade-off analysis technique to
evaluate other complex cryptographic designs similar to password-hashing schemes where …

A New Cryptanalytic Time/Memory/Data Trade-off Algorithm

S Mukhopadhyay, P Sarkar - Cryptology ePrint Archive, 2006 - eprint.iacr.org
… In this paper, we have described a new time/memory trade-off algorithm to invert one-way
functions. Our algorithm can use multiple data and satisfies the TMTO curve T3M7D8 = N7 …

Cryptanalytic time/memory/data tradeoffs for stream ciphers

A Biryukov, A Shamir - Advances in Cryptology—ASIACRYPT 2000: 6th …, 2000 - Springer
… In this paper we concentrate on a general type of cryptanalytic attack known as a time/memory
tradeoff attack. Such an attack has two phases: During the preprocessing phase (which …

A Study on Time/Memory Trade-Off Cryptanalysis

S Mukhopadhyay - 2006 - search.proquest.com
… In 1988, Amirazizi and Hellman [10] proposed time/memory/processor trade-off where more
… the runtime of the cryptanalytic attacks in time/memory trade-off cryptanalysis by running the …

Characterization and improvement of time-memory trade-off based on perfect tables

G Avoine, P Junod, P Oechslin - ACM Transactions on Information and …, 2008 - dl.acm.org
… We provided in this article a thorough analysis of cryptanalytic time-memory trade-offs using
perfect tables. For rainbow, DP, and classic variants, we supplied formulas to compute the …

Practical Considerations on Cryptanalytic Time-Memory Trade-Offs

F Tardif - 2019 - hal.science
… One of the tools used in cryptosystem attacks are cryptanalytic time-memory trade-o s (TMTOs).
TMTOs are a set of generic probabilistic techniques that allow an attacker to perform an …