{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T11:38:03Z","timestamp":1777030683246,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642390586","type":"print"},{"value":"9783642390593","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39059-3_24","type":"book-chapter","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T21:33:17Z","timestamp":1371159197000},"page":"347-362","source":"Crossref","is-referenced-by-count":6,"title":["Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff"],"prefix":"10.1007","author":[{"given":"Byoung-Il","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jin","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Cryptohaze, GPU Rainbow Cracker, \n                    \n                      https:\/\/www.cryptohaze.com\/"},{"key":"24_CR2","unstructured":"L0phtCrack, L0phtCrack\u00a06, \n                    \n                      http:\/\/www.l0phtcrack.com\/"},{"key":"24_CR3","unstructured":"Objectif S\u00e9curit\u00e9, Ophcrack, \n                    \n                      http:\/\/ophcrack.sourceforge.net\/"},{"key":"24_CR4","unstructured":"RainbowCrack Project, RainbowCrack and RainbowCrack for GPU, \n                    \n                      http:\/\/project-rainbowcrack.com\/"},{"issue":"4","key":"24_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1380564.1380565","volume":"11","author":"G. Avoine","year":"2008","unstructured":"Avoine, G., Junod, P., Oechslin, P.: Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inform. Syst. Secur.\u00a011(4), 17:1\u201317:22 (2008); Preliminary version presented at INDOCRYPT 2005","journal-title":"ACM Trans. Inform. Syst. Secur."},{"key":"24_CR6","unstructured":"Barkan, E.P.: Cryptanalysis of Ciphers and Protocols. Ph.D. Thesis, Technion\u2014Israel Institute of Technology (March 2006)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/978-3-540-45146-4_35","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"E. Barkan","year":"2003","unstructured":"Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 600\u2013616. Springer, Heidelberg (2003)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11818175_1","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"E. Barkan","year":"2006","unstructured":"Barkan, E., Biham, E., Shamir, A.: Rigorous bounds on cryptanalytic time\/Memory tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 1\u201321. Springer, Heidelberg (2006)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/11693383_8","volume-title":"Selected Areas in Cryptography","author":"A. Biryukov","year":"2006","unstructured":"Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved time-memory trade-offs with multiple data. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 110\u2013127. Springer, Heidelberg (2006)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Shamir, A.: Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 1\u201313. Springer, Heidelberg (2000)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44706-7_1","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"2001","unstructured":"Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5\/1 on a PC. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"24_CR12","unstructured":"Borst, J.: Block Ciphers: Design, Analysis, and Side-Channel Analysis. Ph.D. Thesis, Katholieke Universiteit Leuven (September 2001)"},{"key":"24_CR13","unstructured":"Borst, J., Preneel, B., Vandewalle, J.: On the time-memory tradeoff betweeen exhaustive key search and table precomputation. In: Proceedings of the 19th Symposium on Information Theory in the Benelux, WIC (1998)"},{"key":"24_CR14","unstructured":"Denning, D.E.: Cryptography and Data Security1. Addison-Wesley (1982)"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J.D.. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Cryptanalysis of alleged A5 stream cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 239\u2013255. Springer, Heidelberg (1997)"},{"key":"24_CR16","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M.E. Hellman","year":"1980","unstructured":"Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Trans. on Infor. Theory\u00a026, 401\u2013406 (1980)","journal-title":"IEEE Trans. on Infor. Theory"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-25578-6_14","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"J. Hong","year":"2011","unstructured":"Hong, J., Lee, G.W., Ma, D.: Analysis of the parallel distinguished point tradeoff. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol.\u00a07107, pp. 161\u2013180. Springer, Heidelberg (2011)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Hong, J., Moon, S.: A comparison of cryptanalytic tradeoff algorithms. To appear in J.\u00a0Cryptology, \n                    \n                      http:\/\/dx.doi.org\/10.1007\/s00145-012-9128-3","DOI":"10.1007\/s00145-012-9128-3"},{"key":"24_CR19","unstructured":"Kim, B.-I., Hong, J.: Analysis of the non-perfect table fuzzy rainbow tradeoff. IACR Cryptology ePrint Archive, Report 2012\/612, version 20121116:123317 (2012)"},{"key":"24_CR20","unstructured":"Lee, G.W., Hong, J.: A comparison of perfect table cryptanalytic tradeoff algorithms. IACR Cryptology ePrint Archive, Report 2012\/540 (2012)"},{"key":"24_CR21","unstructured":"Nohl, K.: Attacking phone privacy. Presented at Black Hat USA 2010, Las Vegas (July 2010)"},{"key":"24_CR22","unstructured":"Nohl, K., Paget, C.: GSM-SRSLY? Presented at 26th Chaos Communication Congress (26C3), Berlin (December 2009)"},{"key":"24_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"24_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/3-540-36400-5_43","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"F.-X. Standaert","year":"2003","unstructured":"Standaert, F.-X., Rouvroy, G., Quisquater, J.-J., Legat, J.-D.: A time-memory tradeoff using distinguished points: New analysis & FPGA results. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 593\u2013609. Springer, Heidelberg (2003)"},{"key":"24_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-642-38553-7_24","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"F. Broek van den","year":"2013","unstructured":"van den Broek, F., Poll, E.: A comparison of time-memory trade-off attacks on stream ciphers. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol.\u00a07918, pp. 406\u2013423. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39059-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T23:55:05Z","timestamp":1557791705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39059-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642390586","9783642390593"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39059-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}