{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:42:31Z","timestamp":1740134551421,"version":"3.37.3"},"reference-count":12,"publisher":"Wiley","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRF-2012R1A1B4003379"],"award-info":[{"award-number":["NRF-2012R1A1B4003379"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Applied Mathematics"],"published-print":{"date-parts":[[2014]]},"abstract":"<jats:p>Cryptanalytic time memory tradeoff algorithms are tools for inverting one-way functions, and they are used in practice to recover passwords that restrict access to digital documents. This work provides an accurate complexity analysis of the perfect table fuzzy rainbow tradeoff algorithm. Based on the analysis results, we show that the lesser known fuzzy rainbow tradeoff performs better than the original rainbow tradeoff, which is widely believed to be the best tradeoff algorithm. The fuzzy rainbow tradeoff can attain higher online efficiency than the rainbow tradeoff and do so at a lower precomputation cost.<\/jats:p>","DOI":"10.1155\/2014\/765394","type":"journal-article","created":{"date-parts":[[2014,6,12]],"date-time":"2014-06-12T18:37:55Z","timestamp":1402598275000},"page":"1-19","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of the Perfect Table Fuzzy Rainbow Tradeoff"],"prefix":"10.1155","volume":"2014","author":[{"given":"Byoung-Il","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Mathematical Sciences and ISaC, Seoul National University, Seoul 151-747, Republic of Korea"}]},{"given":"Jin","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences and ISaC, Seoul National University, Seoul 151-747, Republic of Korea"}]}],"member":"311","reference":[{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056220"},{"year":"1982","key":"8"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_36"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_1"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38553-7_24"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39059-3_24"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_8"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9128-3"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380565"},{"key":"6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44706-7_1","volume-title":"Real time cryptanalysis of A5\/1 on a PC","volume":"1978","year":"2001"},{"key":"17","series-title":"Lecture Notes in Computer Science","first-page":"593","volume-title":"A time-memory tradeoff using distinguished points: new analysis & FPGA results","volume":"2523","year":"2002"}],"container-title":["Journal of Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/765394.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/765394.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/765394.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:47:28Z","timestamp":1498128448000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jam\/2014\/765394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":12,"alternative-id":["765394","765394"],"URL":"https:\/\/doi.org\/10.1155\/2014\/765394","relation":{},"ISSN":["1110-757X","1687-0042"],"issn-type":[{"type":"print","value":"1110-757X"},{"type":"electronic","value":"1687-0042"}],"subject":[],"published":{"date-parts":[[2014]]}}}