{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:03:11Z","timestamp":1761807791356},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642349300"},{"type":"electronic","value":"9783642349317"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34931-7_18","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T22:24:04Z","timestamp":1354746244000},"page":"303-316","source":"Crossref","is-referenced-by-count":8,"title":["High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System"],"prefix":"10.1007","author":[{"given":"Jung Woo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jungjoo","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Kunsoo","family":"Park","sequence":"additional","affiliation":[]},{"given":"Sung-Ryul","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Cryptohaze gpu rainbow cracker, \n                    \n                      https:\/\/www.cryptohaze.com"},{"key":"18_CR2","unstructured":"RainbowCrack Project, \n                    \n                      http:\/\/project-rainbowcrack.com"},{"key":"18_CR3","unstructured":"Maplesoft, Maple 12 user manual (2007)"},{"key":"18_CR4","unstructured":"Nvidia, Nvidia\u2019s next generation CUDA compute architecture: Fermi (2009)"},{"key":"18_CR5","unstructured":"Nvidia, CUDA best practices guide (2012)"},{"key":"18_CR6","unstructured":"Nvidia, CUDA C programming guide (2012)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Avoine, G., Junod, P., Oechslin, P.: Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inf. Syst. Secur.\u00a011(4) (2008)","DOI":"10.1145\/1380564.1380565"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11818175_1","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"E. Barkan","year":"2006","unstructured":"Barkan, E., Biham, E., Shamir, A.: Rigorous Bounds on Cryptanalytic Time\/Memory Tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 1\u201321. Springer, Heidelberg (2006)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-642-01001-9_28","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"D.J. Bernstein","year":"2009","unstructured":"Bernstein, D.J., Chen, T.-R., Cheng, C.-M., Lange, T., Yang, B.-Y.: ECM on Graphics Cards. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 483\u2013501. Springer, Heidelberg (2009)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/11693383_8","volume-title":"Selected Areas in Cryptography","author":"A. Biryukov","year":"2006","unstructured":"Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved Time-Memory Trade-Offs with Multiple Data. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 110\u2013127. Springer, Heidelberg (2006)"},{"key":"18_CR11","unstructured":"Borst, J., Preneel, B., Vandewalle, J.: On the time-memory tradeoff between exhaustive key search and table precomputation. In: Proc. of the 19th Symposium in Information Theory in the Benelux, WIC, pp. 111\u2013118 (1998)"},{"issue":"1","key":"18_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2010\/540159","volume":"18","author":"A.R. Brodtkorb","year":"2010","unstructured":"Brodtkorb, A.R., Dyken, C., Hagen, T.R., Hjelmervik, J.M., Storaasli, O.O.: State-of-the-art in heterogeneous computing. Scientific Programming\u00a018(1), 1\u201333 (2010)","journal-title":"Scientific Programming"},{"key":"18_CR13","unstructured":"Denning, D.E.: Cryptography and Data Security, p. 100. Addison-Wesley (1982)"},{"issue":"3","key":"18_CR14","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1137\/S0097539795280512","volume":"29","author":"A. Fiat","year":"1999","unstructured":"Fiat, A., Naor, M.: Rigorous time\/space trade-offs for inverting functions. SIAM J. Comput.\u00a029(3), 790\u2013803 (1999)","journal-title":"SIAM J. Comput."},{"issue":"4","key":"18_CR15","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M. Hellman","year":"1980","unstructured":"Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory\u00a026(4), 401\u2013406 (1980)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-11925-5_6","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"J. Hermans","year":"2010","unstructured":"Hermans, J., Vercauteren, F., Preneel, B.: Speed Records for NTRU. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 73\u201388. Springer, Heidelberg (2010)"},{"issue":"3","key":"18_CR17","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10623-010-9368-x","volume":"57","author":"J. Hong","year":"2010","unstructured":"Hong, J.: The cost of false alarms in Hellman and rainbow tradeoffs. Des. Codes Cryptography\u00a057(3), 293\u2013327 (2010)","journal-title":"Des. Codes Cryptography"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-25578-6_14","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"J. Hong","year":"2011","unstructured":"Hong, J., Lee, G.W., Ma, D.: Analysis of the Parallel Distinguished Point Tradeoff. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol.\u00a07107, pp. 161\u2013180. Springer, Heidelberg (2011)"},{"key":"18_CR19","unstructured":"Hong, J., Moon, S.: A comparison of cryptanalytic tradeoff algorithms. Journal of Cryptology (to appear)"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/11593447_19","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"J. Hong","year":"2005","unstructured":"Hong, J., Sarkar, P.: New Applications of Time Memory Data Tradeoffs. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 353\u2013372. Springer, Heidelberg (2005)"},{"issue":"1","key":"18_CR21","first-page":"35","volume":"E79-A","author":"K. Kusuda","year":"1996","unstructured":"Kusuda, K., Matsumoto, T.: Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32 and Skipjack. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E79-A(1), 35\u201348 (1996)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Manavski, S.A.: CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: ICSPC (2007)","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/11604938_3","volume-title":"Information Security Applications","author":"S. Mukhopadhyay","year":"2006","unstructured":"Mukhopadhyay, S., Sarkar, P.: Application of LFSRs in Time\/Memory Trade-Off Cryptanalysis. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 25\u201337. Springer, Heidelberg (2006)"},{"issue":"2","key":"18_CR24","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MM.2010.41","volume":"30","author":"J. Nickolls","year":"2010","unstructured":"Nickolls, J., Dally, W.J.: The GPU computing era. IEEE Micro\u00a030(2), 56\u201369 (2010)","journal-title":"IEEE Micro"},{"key":"18_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a Faster Cryptanalytic Time-Memory Trade-Off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/3-540-36400-5_43","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"F.-X. Standaert","year":"2003","unstructured":"Standaert, F.-X., Rouvroy, G., Quisquater, J.-J., Legat, J.-D.: A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 593\u2013609. Springer, Heidelberg (2003)"},{"key":"18_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-85053-3_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"R. Szerwinski","year":"2008","unstructured":"Szerwinski, R., G\u00fcneysu, T.: Exploiting the Power of GPUs for Asymmetric Cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 79\u201399. Springer, Heidelberg (2008)"},{"key":"18_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-25243-3_23","volume-title":"Information and Communications Security","author":"W. Wang","year":"2011","unstructured":"Wang, W., Lin, D., Li, Z., Wang, T.: Improvement and Analysis of VDP Method in Time\/Memory Tradeoff Applications. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol.\u00a07043, pp. 282\u2013296. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34931-7_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:07:49Z","timestamp":1620133669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34931-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349300","9783642349317"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34931-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}