Making a Faster Cryptanalytic Time-Memory Trade-Off
Citations
635 citations
491 citations
Cites background from "Making a Faster Cryptanalytic Time-..."
...To estimate the risk of password-guessing attacks, it has been proposed that administrators pro-actively attempt to crack passwords in their systems [4]....
[...]
419 citations
366 citations
Cites background from "Making a Faster Cryptanalytic Time-..."
...Given forward privacy and given the fact that the encryption keys are erased and that one knowledge of one key do not allow one to recover the previous ones, forward secrecy is straightforward....
[...]
300 citations
References
1,937 citations
761 citations
"Making a Faster Cryptanalytic Time-..." refers background or methods in this paper
...The chance of finding a key by using a table of m rows of t keys is given in the original paper [4] and is the following:...
[...]
...In [4] Hellman introduced a method to trade memory against attack time....
[...]
67 citations
"Making a Faster Cryptanalytic Time-..." refers background in this paper
...Borst notes in [1] that distinguished points also have the following two advantages:...
[...]
...[1] suggest that it is thus easy to generate collision free tables without significant overhead....
[...]
59 citations
55 citations
"Making a Faster Cryptanalytic Time-..." refers background or methods in this paper
...The fact that longer chains yield more merges has been noted in [7] without mentioning that it increases the probability and overhead of false alarms....
[...]
...Finally [7] notes that all calculations used in previous papers are based on Hellman’s original method and that the results may be different when using distinguished points due to the variation of chain length....
[...]