{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:59Z","timestamp":1772283479305,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540306849","type":"print"},{"value":"9783540322672","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_19","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"353-372","source":"Crossref","is-referenced-by-count":60,"title":["New Applications of Time Memory Data Tradeoffs"],"prefix":"10.1007","author":[{"given":"Jin","family":"Hong","sequence":"first","affiliation":[]},{"given":"Palash","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"3GPP TS 55.215 V6.2.0 (2003-09), A5\/3 and GEA3 Specifications, Available from http:\/\/www.gsmworld.com"},{"key":"19_CR2","unstructured":"Consortium for efficient embedded security. Efficient embedded security standards (EESS) #1. Version 2.0 (June 2003), Available from http:\/\/www.ceesstandards.org\/"},{"key":"19_CR3","unstructured":"ECRYPT. Call for stream cipher primitives. Version 1.2 (February 2004), http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Babbage, S.H.: Improved exhaustive search attacks on stream ciphers. In: European Convention on Security and Detection. IEE Conference publication No. 408, pp. 161\u2013166. IEE (1995)","DOI":"10.1049\/cp:19950490"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved time-memory trade-offs with multiple data. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 110\u2013127. Springer, Heidelberg (2006) (to appear)","DOI":"10.1007\/11693383_8"},{"key":"19_CR6","unstructured":"Biryukov, A.: Some thoughts on time-memory-data tradeoffs. Cryptology ePrint Archive, Report 2005\/207 (June 30, 2005), http:\/\/eprint.iacr.org\/2005\/207"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"19_CR8","unstructured":"De Canni\u00e8re, C., Lano, J., Preneel, B.: Comment on the rediscovery of time memory data tradeoffs. Available as a link on the ECRYPT Call for Stream Cipher Primitives\u00a0[3] page version 1.3 (April 2005)"},{"key":"19_CR9","volume-title":"Cryptography and data security","author":"Denning","year":"1982","unstructured":"Denning: Cryptography and data security. Addison-Wesley, Reading (1982)"},{"issue":"3","key":"19_CR10","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1137\/S0097539795280512","volume":"29","author":"A. Fiat","year":"1999","unstructured":"Fiat, A., Naor, M.: Rigorous time\/space tradeoffs for invering functions. SIAM J. on Computing\u00a029(3), 790\u2013803 (1999)","journal-title":"SIAM J. on Computing"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S. Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weakness in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J.D. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 239\u2013255. Springer, Heidelberg (1997)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-30574-3_5","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"Z. Gutterman","year":"2005","unstructured":"Gutterman, Z., Malkhi, D.: Hold your sessions: An attack on Java session-id generation. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 44\u201357. Springer, Heidelberg (2005)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/978-3-540-45146-4_28","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"S. Halevi","year":"2003","unstructured":"Halevi, S., Rogaway, P.: A tweakable enciphering mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 482\u2013499. Springer, Heidelberg (2003)"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-540-24660-2_23","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"S. Halevi","year":"2004","unstructured":"Halevi, S., Rogaway, P.: A parallelizable enciphering mode. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 292\u2013304. Springer, Heidelberg (2004)"},{"key":"19_CR16","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M.E. Hellman","year":"1980","unstructured":"Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Trans. on Infor. Theory\u00a026, 401\u2013406 (1980)","journal-title":"IEEE Trans. on Infor. Theory"},{"key":"19_CR17","unstructured":"Hong, J., Sarkar, P.: Rediscovery of time memory tradeoffs. Cryptology ePrint Archive, Report 2005\/090 (March 22, 2005), http:\/\/eprint.iacr.org\/2005\/090"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-30574-3_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N. Howgrave-Graham","year":"2005","unstructured":"Howgrave-Graham, N., Silverman, J.H., Whyte, W.: Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 118\u2013135. Springer, Heidelberg (2005)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-39887-5_11","volume-title":"Fast Software Encryption","author":"T. Iwata","year":"2003","unstructured":"Iwata, T., Kurosawa, K.: OMAC: One-Key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 129\u2013153. Springer, Heidelberg (2003)"},{"key":"19_CR20","unstructured":"Kim, I.-J., Matsumoto, T.: Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size. IEICE Trans. Fundamentals, E82-A, pp. 123\u2013129 (1999)"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-45708-9_3","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"M. Liskov","year":"2002","unstructured":"Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 31\u201346. Springer, Heidelberg (2002)"},{"key":"19_CR22","unstructured":"Mukhopadhyay, S., Sarkar, P.: TMTO with multiple data: Analysis and new single table trade-offs. Cryptology ePrint Archive, Report 2005\/214 (July 4, 2005), http:\/\/eprint.iacr.org\/2005\/214"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a fast cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"19_CR24","first-page":"196","volume-title":"8th ACM CCS","author":"P. Rogaway","year":"2001","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block-ciper mode of operation for efficient authenticated ecryption. In: 8th ACM CCS, pp. 196\u2013205. ACM Press, New York (2001)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Stream ciphers: Dead or alive? Presentation slides for invited talk given at Asiacrypt (2004), Available from http:\/\/www.iris.re.kr\/ac04\/","DOI":"10.1007\/978-3-540-30539-2_6"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:41Z","timestamp":1605643361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11593447_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}