{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T11:38:02Z","timestamp":1777030682197,"version":"3.51.4"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,7,24]],"date-time":"2012-07-24T00:00:00Z","timestamp":1343088000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1007\/s00145-012-9128-3","type":"journal-article","created":{"date-parts":[[2012,7,23]],"date-time":"2012-07-23T13:56:32Z","timestamp":1343051792000},"page":"559-637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A Comparison of Cryptanalytic Tradeoff Algorithms"],"prefix":"10.1007","volume":"26","author":[{"given":"Jin","family":"Hong","sequence":"first","affiliation":[]},{"given":"Sunghwan","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,24]]},"reference":[{"issue":"4","key":"9128_CR1","doi-asserted-by":"publisher","first-page":"17:1","DOI":"10.1145\/1380564.1380565","volume":"11","author":"G. Avoine","year":"2008","unstructured":"G. Avoine, P. Junod, P. Oechslin, Characterization and improvement of time-memory trade-off based on perfect tables. ACM Trans. Inf. Syst. Secur.\n                  11(4), 17:1\u201317:22 (2008). Preliminary version in INDOCRYPT 2005","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9128_CR2","series-title":"IEE Conference Publication","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1049\/cp:19950490","volume-title":"European Convention on Security and Detection","author":"S.H. Babbage","year":"1995","unstructured":"S.H. Babbage, Improved exhaustive search attacks on stream ciphers, in European Convention on Security and Detection. IEE Conference Publication, vol. 408 (IEE, London, 1995), pp. 161\u2013166"},{"key":"9128_CR3","unstructured":"E.P. Barkan, Cryptanalysis of ciphers and protocols. Ph.D. Thesis, Israel Institute of Technology, March 2006"},{"key":"9128_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11818175_1","volume-title":"Advances in Cryptology\u2014CRYPTO 2006","author":"E. Barkan","year":"2006","unstructured":"E. Barkan, E. Biham, A. Shamir, Rigorous bounds on cryptanalytic time\/memory tradeoffs, in Advances in Cryptology\u2014CRYPTO 2006. LNCS, vol. 4117 (Springer, Berlin, 2006), pp. 1\u201321"},{"key":"9128_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44448-3_1","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"A. Biryukov, A. Shamir, Cryptanalytic time\/memory\/data tradeoffs for stream ciphers, in Advances in Cryptology\u2014ASIACRYPT 2000. LNCS, vol. 1976 (Springer, Berlin, 2000), pp. 1\u201313"},{"key":"9128_CR6","series-title":"LNCS","first-page":"1","volume-title":"FSE 2000","author":"A. Biryukov","year":"2001","unstructured":"A. Biryukov, A. Shamir, D. Wagner, Real time cryptanalysis of A5\/1 on a PC, in FSE 2000. LNCS, vol. 1978 (Springer, Berlin, 2001), pp. 1\u201318"},{"key":"9128_CR7","unstructured":"J. Borst, Block ciphers: Design, analysis, and side-channel analysis. Ph.D. Thesis, Katholieke Universiteit Leuven, September 2001"},{"key":"9128_CR8","unstructured":"J. Borst, B. Preneel, J. Vandewalle, On the time-memory tradeoff between exhaustive key search and table precomputation, in Proceedings of the 19th Symposium on Information Theory in the Benelux (WIC, 1998)"},{"key":"9128_CR9","unstructured":"C. Calik, How to invert one-way functions: time-memory trade-off method. M.S. Thesis, Middle East Technical University, January 2007"},{"key":"9128_CR10","volume-title":"Cryptography and Data Security","author":"D.E. Denning","year":"1982","unstructured":"D.E. Denning, Cryptography and Data Security (Addison-Wesley, Reading, 1982)"},{"key":"9128_CR11","series-title":"LNCS","first-page":"329","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201989","author":"P. Flajolet","year":"1990","unstructured":"P. Flajolet, A.M. Odlyzko, Random mapping statistics, in Advances in Cryptology\u2014EUROCRYPT\u201989. LNCS, vol. 434 (Springer, Berlin, 1990), pp. 329\u2013354"},{"key":"9128_CR12","unstructured":"S. Goldwasser, M. Bellare, Lecture notes on cryptography. Unpublished manuscript, July 2008. Available at: \n                    http:\/\/cseweb.ucsd.edu\/~mihir\/papers\/gb.html"},{"key":"9128_CR13","series-title":"LNCS","first-page":"239","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201997","author":"J.Dj. Goli\u0107","year":"1997","unstructured":"J.Dj. Goli\u0107, Cryptanalysis of alleged A5 stream cipher, in Advances in Cryptology\u2014EUROCRYPT\u201997. LNCS, vol. 1233 (Springer, Berlin, 1997), pp. 239\u2013255"},{"key":"9128_CR14","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M.E. Hellman","year":"1980","unstructured":"M.E. Hellman, A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theory\n                  26, 401\u2013406 (1980)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9128_CR15","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10623-010-9368-x","volume":"57","author":"J. Hong","year":"2010","unstructured":"J. Hong, The cost of false alarms in Hellman and rainbow tradeoffs. Des. Codes Cryptogr.\n                  57, 293\u2013327 (2010)","journal-title":"Des. Codes Cryptogr."},{"key":"9128_CR16","volume-title":"Introduction to Modern Cryptography","author":"J. Katz","year":"2008","unstructured":"J. Katz, Y. Lindell, Introduction to Modern Cryptography (Chapman & Hall\/CRC, London, 2008)"},{"key":"9128_CR17","first-page":"123","volume":"E82-A","author":"I.-J. Kim","year":"1999","unstructured":"I.-J. Kim, T. Matsumoto, Achieving higher success probability in time-memory trade-off cryptanalysis without increasing memory size. IEICE Trans. Fundam. Electron. Commun. Comput. Sci.\n                  E82-A, 123\u2013129 (1999)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"1","key":"9128_CR18","first-page":"35","volume":"79","author":"K. Kusuda","year":"1996","unstructured":"K. Kusuda, T. Matsumoto, Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32, and Skipjack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci.\n                  79(1), 35\u201348 (1996)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"7","key":"9128_CR19","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.ipl.2008.12.002","volume":"109","author":"D. Ma","year":"2009","unstructured":"D. Ma, J. Hong, Success probability of the Hellman trade-off. Inf. Process. Lett.\n                  109(7), 347\u2013351 (2009)","journal-title":"Inf. Process. Lett."},{"key":"9128_CR20","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography (CRC Press, Boca Raton, 1997)"},{"key":"9128_CR21","unstructured":"S. Moon, Parameter selection in cryptanalytic time memory tradeoffs. M.S. Thesis, Seoul National University, June 2009"},{"key":"9128_CR22","first-page":"364","volume-title":"Proceedings of the 12th ACM CCS","author":"A. Narayanan","year":"2005","unstructured":"A. Narayanan, V. Shmatikov, Fast dictionary attacks on passwords using time-space tradeoff, in Proceedings of the 12th ACM CCS (ACM, New York, 2005), pp. 364\u2013372"},{"key":"9128_CR23","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology\u2014CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"P. Oechslin, Making a faster cryptanalytic time-memory trade-off, in Advances in Cryptology\u2014CRYPTO 2003. LNCS, vol. 2729 (Springer, Berlin, 2003), pp. 617\u2013630"},{"key":"9128_CR24","volume-title":"Contemporary Cryptography","author":"R. Oppliger","year":"2005","unstructured":"R. Oppliger, Contemporary Cryptography (Artech House, Boston, 2005)"},{"key":"9128_CR25","unstructured":"J.-J. Quisquater, J. Stern, Time-memory tradeoff revisited. Unpublished manuscript, December 1998"},{"key":"9128_CR26","unstructured":"N. Saran, Time memory trade off attack on symmetric ciphers. Ph.D. Thesis, Middle East Technical University, February 2009"},{"key":"9128_CR27","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1109\/ARES.2009.140","volume-title":"2009 International Conference on Availability, Reliability and Security","author":"N. Saran","year":"2009","unstructured":"N. Saran, A. Doganaksoy, Choosing parameters to achieve a higher success rate for Hellman time memory trade off attack, in 2009 International Conference on Availability, Reliability and Security (IEEE, New York, 2009), pp. 504\u2013509"},{"key":"9128_CR28","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/3-540-36400-5_43","volume-title":"Cryptographic Hardware and Embedded Systems\u2014CHES 2002","author":"F.-X. Standaert","year":"2003","unstructured":"F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, A time-memory tradeoff using distinguished points: New analysis & FPGA results, in Cryptographic Hardware and Embedded Systems\u2014CHES 2002. LNCS, vol. 2523 (Springer, Berlin, 2003), pp. 593\u2013609"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9128-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-012-9128-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9128-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9128-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:09:29Z","timestamp":1586333369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-012-9128-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,24]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["9128"],"URL":"https:\/\/doi.org\/10.1007\/s00145-012-9128-3","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,24]]},"assertion":[{"value":"19 July 2010","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2012","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}