Time memory data tradeoff attack
Results: 3
# | Item |
---|---|
1![]() | Microsoft PowerPoint - isc2015jiaolinAdd to Reading ListSource URL: isc2015.item.ntnu.noLanguage: English - Date: 2015-09-20 14:16:37 |
2![]() | IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACKAdd to Reading ListSource URL: www.cba.mit.eduLanguage: English - Date: 2011-12-13 18:32:02 |
3![]() | IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUST[removed]TABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACKAdd to Reading ListSource URL: cba.mit.eduLanguage: English - Date: 2011-12-13 18:32:02 |