Author of the publication

Making a Faster Cryptanalytic Time-Memory Trade-Off.

. CRYPTO, volume 2729 of Lecture Notes in Computer Science, page 617-630. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing Time Complexity in RFID Systems., , and . Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, page 291-306. Springer, (2005)Arequipa: Using TCP/IP over ATM with quality of service is simple ... if you have ATM end-to-end., , and . Networking and Information Systems, 1 (4-5): 469-494 (1998)Differentiated end-to-end Internet services using a weighted proportional fair sharing TCP., and . Comput. Commun. Rev., 28 (3): 53-69 (1998)Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables., , and . ACM Trans. Inf. Syst. Secur., 11 (4): 17:1-17:22 (2008)Tracing Attacks and Restoring Integrity with Lascar., and . IICIS, volume 140 of IFIP, page 115-124. Springer, (2003)Computer system security - Basic Concepts and Solved Exercises., , and . Computer and communication sciences CRC Press, (2007)Cyber-secure communication architecture for active power distribution networks., , , and . SAC, page 545-552. ACM, (2014)RFID Traceability: A Multilayer Problem., and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 125-140. Springer, (2005)A Scalable and Provably Secure Hash-Based RFID Protocol., and . PerCom Workshops, page 110-114. IEEE Computer Society, (2005)Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints., , and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 183-196. Springer, (2005)