{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:04:43Z","timestamp":1725505483055},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540791034"},{"type":"electronic","value":"9783540791041"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79104-1_10","type":"book-chapter","created":{"date-parts":[[2008,3,13]],"date-time":"2008-03-13T07:28:21Z","timestamp":1205393301000},"page":"131-145","source":"Crossref","is-referenced-by-count":10,"title":["Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs"],"prefix":"10.1007","author":[{"given":"Jin","family":"Hong","sequence":"first","affiliation":[]},{"given":"Kyung Chul","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Eun Young","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"In-Sok","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Daegun","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"3GPP TS 35.202 V7.0.0, Kasumi specification (2007-06), \n                  \n                    http:\/\/www.3gpp.org"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/11596219_15","volume-title":"Progress in Cryptology - INDOCRYPT 2005","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., Junod, P., Oechslin, P.: Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol.\u00a03797, pp. 183\u2013196. Springer, Heidelberg (2005)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Babbage, S.: Improved \u201cExhaustive Search\u201d Attacks on Stream Ciphers. In: European Convention on Security and Detection, Conference publication, vol. 408, pp. 161\u2013166, IEE (1995)","DOI":"10.1049\/cp:19950490"},{"key":"10_CR4","unstructured":"Barkan, E.: Cryptanlysis of Ciphers and Protocols, Ph. D. Thesis. (2006), \n                  \n                    http:\/\/www.cs.technion.ac.il\/users\/wwwb\/cgi-bin\/tr-info.cgi?2006\/PHD\/PHD-2006-04"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11818175_1","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"E. Barkan","year":"2006","unstructured":"Barkan, E., Biham, E., Shamir, A.: Rigorous Bounds on Cryptanalytic Time\/Memory Tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 1\u201321. Springer, Heidelberg (2006)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic Time\/Memory\/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44706-7_1","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A., Wagner, D.: Real Time Cryptanalysis of A5\/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"10_CR8","unstructured":"Borst, J., Preneel, B., Vandewalle, J.: On the Time-Memory Tradeoff Between Exhaustive Key Search and Table Precomputation. In: Proceedings of the 19th Symposium in Information Theory in the Benelux, WIC, pp. 111\u2013118 (1998)"},{"key":"10_CR9","first-page":"100","volume-title":"Cryptography and Data Security","author":"D.E. Denning","year":"1982","unstructured":"Denning, D.E.: Cryptography and Data Security, p. 100. Addison-Wesley, Reading (1982)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J.D.. Golic","year":"1997","unstructured":"Golic, J.D.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 239\u2013255. Springer, Heidelberg (1997)"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"IT-26","author":"M.E. Hellman","year":"1980","unstructured":"Hellman, M.E.: A Cryptanalytic Time-Memory Trade-Off. IEEE Transactions on Information Theory\u00a0IT-26(4), 401\u2013406 (1980)","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR12","unstructured":"Hong, J., Jeong, K.C., Kwon, E.Y., Lee, I.-S., Ma, D.: Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version). Cryptology ePrint Archive, Report 2008\/054 (2008), \n                  \n                    http:\/\/eprint.iacr.org\/2008\/054"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/11593447_19","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"J. Hong","year":"2005","unstructured":"Hong, J., Sarkar, P.: New Applications of Time Memory Data Tradeoffs. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 353\u2013372. Springer, Heidelberg (2005)"},{"issue":"1","key":"10_CR14","first-page":"123","volume":"E82-A","author":"I.-J. Kim","year":"1999","unstructured":"Kim, I.-J., Matsumoto, T.: Achieving Higher Success Probability in Time-Memory Trade-Off Cryptanalysis without Increasing Memory Size. IEICE Transactions on Fundamentals\u00a0E82-A(1), 123\u2013129 (1999)","journal-title":"IEICE Transactions on Fundamentals"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a Faster Cryptanalytic Time-Memory Trade-Off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/3-540-36400-5_43","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"F.-X. Standaert","year":"2003","unstructured":"Standaert, F.-X., Rouvroy, G., Quisquater, J.-J., Legat, J.-D.: A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 593\u2013609. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79104-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:10:11Z","timestamp":1619521811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79104-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540791034","9783540791041"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79104-1_10","relation":{},"subject":[]}}