{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T23:49:01Z","timestamp":1768693741601,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/fpl.2013.6645525","type":"proceedings-article","created":{"date-parts":[[2013,10,31]],"date-time":"2013-10-31T00:10:16Z","timestamp":1383178216000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["Fast, FPGA-based Rainbow Table creation for attacking encrypted mobile communications"],"prefix":"10.1109","author":[{"given":"Panagiotis","family":"Papantonakis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dionisios","family":"Pnevmatikatos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ioannis","family":"Papaefstathiou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Charalampos","family":"Manifavas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","first-page":"64","article-title":"Block encryption algorithm MISTY","author":"matsui","year":"1997","journal-title":"Proceedings of Fast Software Encryption 1997 Lecture Notes in Computer Science 1267"},{"key":"17","article-title":"Cracking unix passwords using fpga platforms","author":"mentens","year":"2005","journal-title":"SHARCS'05"},{"key":"18","article-title":"Time-Memory trade-off attack on fpga platforms: Unix password cracking","author":"mentens","year":"2006","journal-title":"ARC 2006 Delft"},{"key":"15","article-title":"Subverting the security base of GSM","author":"karsten","year":"2009","journal-title":"Hacking at Random Conference"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2004.1329330"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056220"},{"key":"14","article-title":"GSM: Srsly?","author":"nohl","year":"2009","journal-title":"26th Chaos Communication Congress (26C3)"},{"key":"11","first-page":"393","article-title":"A practical-time attack on the a5\/3 cryptosystem used in third generation gsm telephony","author":"dunkelman","year":"2010","journal-title":"International Crytology Conference-CRYPTO"},{"key":"12","year":"2000","journal-title":"Specification of the 3GPP Confidentiality and Integrity Algorithms Document 1"},{"key":"21","year":"2003","journal-title":"Comparison of Airlink Encryptions"},{"key":"20","article-title":"Making a faster cryptanalytic time-memory trade-off","author":"oechslin","year":"2003","journal-title":"Proc of Advances in Cryptology 23th Annual International Cryptology Conference"},{"key":"22","article-title":"A cryptanalytic time-memory trade-off: First FPGA implementation","author":"quisquater","year":"1998","journal-title":"FPL 1998"},{"key":"23","year":"0"},{"key":"24","first-page":"287","article-title":"Implementing rainbow tables in high-end fpgas for super-fast password cracking","author":"theocharoulis","year":"2009","journal-title":"17th IEEE Symposium on Field Programmable Custom Computing Machines"},{"key":"25","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1016\/j.comcom.2003.12.004","article-title":"Security in 3rd generation mobile networks","volume":"27","author":"xenakis","year":"2004","journal-title":"Computer Communications-COMCOM Elsevier Science"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0213-5"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.80"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339146"},{"key":"29","year":"0"},{"key":"3","year":"2002","journal-title":"Technical Specification Group Services and System Aspects"},{"key":"2","year":"2002","journal-title":"Technical Specification Group Services and System Aspects"},{"key":"10","year":"0"},{"key":"1","year":"2001","journal-title":"Technical Specification Group Services and System Aspects"},{"key":"30","year":"0"},{"key":"7","article-title":"Instant ciphertext-only cryptanalysis of gsm encrypted communication","author":"barkan","year":"2003","journal-title":"Proceedings of Crypto"},{"key":"6","article-title":"An efficient hardware implementation of the kasumi block cipher for third generation cellular networks","author":"balderas-contreras","year":"2004","journal-title":"Proceedings of the Global Signal Processing Conference"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380565"},{"key":"31","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/235968.233332","article-title":"Random I\/O scheduling in online Tertiary storage systems","author":"hillyer","year":"1996","journal-title":"Proc ACM SIGMOD"},{"key":"4","year":"0"},{"key":"9","article-title":"Block ciphers and stream ciphers: The state of the art","author":"biryukov","year":"2004","journal-title":"Cryptology ePrint Archive"},{"key":"8","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/11593447_24","article-title":"A related-key rectangle attack on the full kasumi","volume":"3788","author":"biham","year":"2005","journal-title":"Advances in Cryptology-Asiacrypt '05 Lecture Notes in Computer Science"}],"event":{"name":"2013 23rd International Conference on Field Programmable Logic and Applications (FPL)","location":"Porto, Portugal","start":{"date-parts":[[2013,9,2]]},"end":{"date-parts":[[2013,9,4]]}},"container-title":["2013 23rd International Conference on Field programmable Logic and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6632515\/6645482\/06645525.pdf?arnumber=6645525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:07:26Z","timestamp":1498093646000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6645525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/fpl.2013.6645525","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}