{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:26:11Z","timestamp":1725848771291},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319294841"},{"type":"electronic","value":"9783319294858"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29485-8_21","type":"book-chapter","created":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T05:33:40Z","timestamp":1454304820000},"page":"359-377","source":"Crossref","is-referenced-by-count":5,"title":["Optimization of Rainbow Tables for Practically Cracking GSM A5\/1 Based on Validated Success Rate Modeling"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Li","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,2]]},"reference":[{"key":"21_CR1","unstructured":"Anderson, R.: A5 (was: Hacking digital phones). Newsgroup Communication (1994)"},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1380564.1380565","volume":"11","author":"G Avoine","year":"2008","unstructured":"Avoine, G., Junod, P., Oechslin, P.: Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inf. Syst. Secur. 11(4), 17 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11818175_1","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"E Barkan","year":"2006","unstructured":"Barkan, E., Biham, E., Shamir, A.: Rigorous bounds on cryptanalytic time\/memory tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 1\u201321. Springer, Heidelberg (2006)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E Biham","year":"1997","unstructured":"Biham, E.: A fast new DES implementation in software. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 260\u2013272. Springer, Heidelberg (1997)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/3-540-44495-5_5","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"E Biham","year":"2000","unstructured":"Biham, E., Dunkelman, O.: Cryptanalysis of the A5\/1 GSM stream cipher. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 43\u201351. Springer, Heidelberg (2000)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44706-7_1","volume-title":"Fast Software Encryption","author":"A Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5\/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"21_CR7","unstructured":"Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of the GSM A5\/1 and A5\/2 \u2018voice privacy\u2019 encryption algorithms (1999). \n                      www.scard.org\/gsm\/a51.html"},{"issue":"1","key":"21_CR8","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TIT.2002.806129","volume":"49","author":"P Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: Another attack on A5\/1. IEEE Trans. Inf. Theor. 49(1), 284\u2013289 (2003)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-540-85053-3_17","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"T Gendrullis","year":"2008","unstructured":"Gendrullis, T., Novotn\u00fd, M., Rupp, A.: A real-world attack breaking A5\/1 within hours. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 266\u2013282. Springer, Heidelberg (2008)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology - EUROCRYPT 1997","author":"JD Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239\u2013255. Springer, Heidelberg (1997)"},{"issue":"4","key":"21_CR11","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M Hellman","year":"1980","unstructured":"Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theor. 26(4), 401\u2013406 (1980)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"21_CR12","unstructured":"Keller, J., Seitz, B.: A hardware-based attack on the A5\/1 stream cipher. In: ITG FACHBERICHT, pp. 155\u2013158 (2001)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-39059-3_24","volume-title":"Information Security and Privacy","author":"B-I Kim","year":"2013","unstructured":"Kim, B.-I., Hong, J.: Analysis of the non-perfect table fuzzy rainbow tradeoff. In: Boyd, C., Simpson, L. (eds.) ACISP 2013. LNCS, vol. 7959, pp. 347\u2013362. Springer, Heidelberg (2013)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-319-28166-7_17","volume-title":"Applied Cryptography and Network Security","author":"J Lu","year":"2015","unstructured":"Lu, J., Li, Z., Henricksen, M.: Time\u2013memory trade-off attack on the GSM A5\/1 stream cipher using commodity GPGPU. In: Malkin, T., et al. (eds.) ACNS 2015. LNCS, vol. 9092, pp. 350\u2013369. Springer, Heidelberg (2015)"},{"issue":"7","key":"21_CR15","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.ipl.2008.12.002","volume":"109","author":"D Ma","year":"2009","unstructured":"Ma, D., Hong, J.: Success probability of the Hellman trade-off. Inf. Process. Lett. 109(7), 347\u2013351 (2009)","journal-title":"Inf. Process. Lett."},{"key":"21_CR16","unstructured":"Nohl, K.: Attacking phone privacy. In: BlackHat 2010 Lecture Notes USA (2010). \n                      https:\/\/srlabs.de\/decrypting_gsm"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a Faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"21_CR18","volume-title":"Cryptography and Data Security","author":"DE Robling Denning","year":"1982","unstructured":"Robling Denning, D.E.: Cryptography and Data Security. Addison-Wesley Longman Publishing Co., Inc., Boston (1982)"},{"issue":"3","key":"21_CR19","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.jocs.2013.10.006","volume":"5","author":"ER Sykes","year":"2014","unstructured":"Sykes, E.R., Skoczen, W.: An improved parallel implementation of RainbowCrack using MPI. J. Comput. Sci. 5(3), 536\u2013541 (2014). Elsevier","journal-title":"J. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology - CT-RSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29485-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T08:26:19Z","timestamp":1559377579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29485-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319294841","9783319294858"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29485-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}