<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462009000100007</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Hardware Architecture and Cost/time/data Trade-off for Generic Inversion of One-Way Function]]></article-title>
<article-title xml:lang="es"><![CDATA[Arquitectura en Hardware y Compromiso de Costo, Tiempo y Datos para Inversiones Genéricas de Funciones Unidireccionales]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mukhopadhyay]]></surname>
<given-names><![CDATA[Sourav]]></given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[Palash]]></given-names>
</name>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Dublin City University Glasnevin Electronic Engineering Department ]]></institution>
<addr-line><![CDATA[Dublin ]]></addr-line>
<country>Ireland</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Indian Statistical Institute Applied Statistics Unit ]]></institution>
<addr-line><![CDATA[Kolkata ]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2009</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2009</year>
</pub-date>
<volume>12</volume>
<numero>3</numero>
<fpage>331</fpage>
<lpage>355</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462009000100007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462009000100007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462009000100007&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[In many cases, a cryptographic algorithm can be viewed as a one-way function, which is easy to compute in forward direction but hard to invert. Inverting such one-way function amounts to breaking the algorithm. Time-Memory Trade-Off (TMTO) is a twenty five years old generic technique for inverting one-way functions. The most feasible implementation of TMTO is in special purpose hardware. In this paper, we describe a systematic architecture for implementing TMTO. We break down the offline and online phases into simpler tasks and identify opportunities for pipelining and parallelism. This results in a detailed top-level architecture. Many of our design choices are based on intuition. We develop a cost model for our architecture. Analysis of the cost model shows that 128-bit keys seem safe for the present. However, key sizes less than 96 bits do not provide comfortable security assurances.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En muchos casos, un algoritmo criptográfico puede ser visto como una función de sólo ida, la cual es fácil de calcular pero difícil de invertir. Invertir una función de sólo ida es equivalente a romper el algoritmo criptográfico. Compromisos de tiempo-memoria (TMTO por sus siglas en inglés) es una vieja técnica genérica concebida más de veinticinco años atrás para invertir funciones de sólo ida. La implementación más factible de TMTO es la de arquitecturas de hardware de propósito especial, y es así que en este artículo, describimos una arquitectura de ese tipo capaz de implementar dicho método. Subdividimos las fases fuera de línea y en línea del algoritmo en tareas simples e identificamos oportunidades para paralelizar y/o utilizar técnicas de tubería. Este proceso nos condujo a proponer una arquitectura de alto nivel muy detallada, en la cual muchas de las elecciones de diseño estuvieron basadas en la intuición. Asimismo, desarrollamos un modelo de costos para nuestra arquitectura. El análisis del modelo de costo sugiere que las llaves de 128 bits pueden ser consideradas seguras en la actualidad. Sin embargo, las llaves con longitudes menores de 96 bits no brindan garantías de seguridad suficientes.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[One-way function]]></kwd>
<kwd lng="en"><![CDATA[generic method]]></kwd>
<kwd lng="en"><![CDATA[time/meomry trade-off cryptanalysis]]></kwd>
<kwd lng="es"><![CDATA[Funciones de sólo ida]]></kwd>
<kwd lng="es"><![CDATA[método genérico]]></kwd>
<kwd lng="es"><![CDATA[cripto-análisis de compromiso tiempo memoria]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>Hardware Architecture and Cost/time/data Trade&#150;off for Generic Inversion of One&#150;Way Function</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b><i>Arquitectura en Hardware y Compromiso de Costo, Tiempo y Datos para Inversiones Gen&eacute;ricas de Funciones Unidireccionales</i></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Sourav Mukhopadhyay<sup>1</sup> and Palash Sarkar<sup>2</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>1</sup> Electronic Engineering Department Dublin City University Glasnevin, Dublin 9 Ireland.  </i>E&#150;mail: <a href="mailto:masourav@eeng.dcu.ie">masourav@eeng.dcu.ie</a></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> Applied Statistics Unit Indian Statistical Institute 203 B.T. Road, Kolkata India&#150;700108.  </i>E&#150;mail: <a href="mailto:palash@isical.ac.in">palash@isical.ac.in</a></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2">Article received on March 1, 2008    <br> Accepted on October 3, 2008</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">In many cases, a cryptographic algorithm can be viewed as a one&#150;way function, which is easy to compute in forward direction but hard to invert. Inverting such one&#150;way function amounts to breaking the algorithm. Time&#150;Memory Trade&#150;Off (TMTO) is a twenty five years old generic technique for inverting one&#150;way functions. The most feasible implementation of TMTO is in special purpose hardware. In this paper, we describe a systematic architecture for implementing TMTO. We break down the offline and online phases into simpler tasks and identify opportunities for pipelining and parallelism. This results in a detailed top&#150;level architecture. Many of our design choices are based on intuition. We develop a cost model for our architecture. Analysis of the cost model shows that 128&#150;bit keys seem safe for the present. However, key sizes less than 96 bits do not provide comfortable security assurances.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords: </b>One&#150;way function, generic method, time/meomry trade&#150;off cryptanalysis.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">En muchos casos, un algoritmo criptogr&aacute;fico puede ser visto como una funci&oacute;n de s&oacute;lo ida, la cual es f&aacute;cil de calcular pero dif&iacute;cil de invertir. Invertir una funci&oacute;n de s&oacute;lo ida es equivalente a romper el algoritmo criptogr&aacute;fico. Compromisos de tiempo&#150;memoria (TMTO por sus siglas en ingl&eacute;s) es una vieja t&eacute;cnica gen&eacute;rica concebida m&aacute;s de veinticinco a&ntilde;os atr&aacute;s para invertir funciones de s&oacute;lo ida. La implementaci&oacute;n m&aacute;s factible de TMTO es la de arquitecturas de hardware de prop&oacute;sito especial, y es as&iacute; que en este art&iacute;culo, describimos una arquitectura de ese tipo capaz de implementar dicho m&eacute;todo. Subdividimos las fases fuera de l&iacute;nea y en l&iacute;nea del algoritmo en tareas simples e identificamos oportunidades para paralelizar y/o utilizar t&eacute;cnicas de tuber&iacute;a. Este proceso nos condujo a proponer una arquitectura de alto nivel muy detallada, en la cual muchas de las elecciones de dise&ntilde;o estuvieron basadas en la intuici&oacute;n. Asimismo, desarrollamos un modelo de costos para nuestra arquitectura. El an&aacute;lisis del modelo de costo sugiere que las llaves de 128 bits pueden ser consideradas seguras en la actualidad. Sin embargo, las llaves con longitudes menores de 96 bits no brindan garant&iacute;as de seguridad suficientes.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Palabras Claves: </b>Funciones de s&oacute;lo ida, m&eacute;todo gen&eacute;rico, cripto&#150;an&aacute;lisis de compromiso tiempo memoria.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v12n3/v12n3a7.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Acknowledgments</b></font></p>     <p align="justify"><font face="verdana" size="2">Authors would like to thank anonymous reviewers for providing constructive and generous feedback. Despite their invaluable assistance any error remaining in this paper is solely attributed to the author.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. <b>3GPP. </b>3rd generation partnership program, <a href="http://www.3gpp.org/" target="_blank">http://www.3gpp.org/</A></a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046892&pid=S1405-5546200900010000700001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2.<b> 3GPP </b>(2003). 3gpp ts 55.215 v6.2.0 (2003&#150;09), a5/3 and gea3 specifications. <a href="http://www.gsmworld.com/" target="_blank">http://www.gsmworld.com</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046893&pid=S1405-5546200900010000700002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3.<b> Amirazizi, H. and M. Hellman </b>(1988). Time&#150;memory&#150;processor trade&#150;offs. <i>IEEE Transactions on Information Theory 34</i>(<i>3</i>), 505&#150;512.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046894&pid=S1405-5546200900010000700003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4.<b> Biham, E. </b>(1994). New types of cryptanaly tic attacks using related keys. <i>Journal of Cryptology </i>7(4), 229&#150;246.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046895&pid=S1405-5546200900010000700004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5.<b> Biham, E., A. Biryukov, and A. Shamir </b>(1999a). Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In <i>Eurocrypt 1999, Proceedings, </i>Volume 1592 <i>of Lecture Notes in Computer Science, </i>pp. 12&#150;23. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046896&pid=S1405-5546200900010000700005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6.<b> Biham, E., A. Biryukov, and A. Shamir </b>(1999b). Miss in the middle attacks on idea and khufu. <i>in FSE 1999, Proceedings, </i>Volume 1636 <i>of Lecture Notes in Computer Science, </i>pp. 124&#150;138. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046897&pid=S1405-5546200900010000700006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7.<b> Biham, E. and A. Shamir </b>(1993). <i>Differential Cryptanalysis of the Data Encryption Standard. </i>Springer Verlag. </font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046898&pid=S1405-5546200900010000700007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8.<b> Biryukov, A.</b> (2005). Some thoughts on time&#150;memory &#150;data tradeoffs, <a href="http://eprint.iacr.org/" target="_blank">http://eprint.iacr.org/2005/207</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046899&pid=S1405-5546200900010000700008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9.<b> Biryukov, A. and A. Shamir </b>(2000). Cyptanalytic time/memory/data tradeoffs for stream ciphers. In <i>Asiacrypt 2000, Proceedings, </i>Volume 1976 <i>of Lecture Notes in Computer Science, </i>pp. 1&#150;13. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046900&pid=S1405-5546200900010000700009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10.<b> Biryukov, A. and D. Wagner </b>(1999). Slide attack. In<i> FSE 1999, Proceedings, </i>Volume 1636 of <i>Lecture Notes in Computer Science, </i>pp. 245&#150;259. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046901&pid=S1405-5546200900010000700010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11.<b> Borst, J., B. Preneel, and J. Vandewalle </b>(1999). Linear cryptanalysis of rc5 and rc6. In <i>FSE 1999, Proceedings, </i>Volume 1636 of <i>Lecture Notes in Computer Science, </i>pp. 16&#150;30. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046902&pid=S1405-5546200900010000700011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12.<b> COPACOPANA </b>(2006). A codebreakerfor des and other ciphers.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046903&pid=S1405-5546200900010000700012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13.<b> Denning, D. </b>(1982). <i>Cryptography and data security. </i>Addison Wesley.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046904&pid=S1405-5546200900010000700013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14. <b>EFF</b> (1998). <i>Electronics Frontier Foundation: Cracking DES. </i>O'Reilly and Associates.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046905&pid=S1405-5546200900010000700014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15. <b>ETSI/SAGE</b> (2002). Specification of the a5/3 encryption algorithms for gsm and edge, and the gea3 encryption algorithm for gprs, document 1: A5/3 and gea 3 specifications.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046906&pid=S1405-5546200900010000700015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16.<b> Fiat, A. and M. Naor </b>(1991). Rigorous time/space tradeoffs for inverting functions. In <i>STOC 1991, </i>pp. 534&#150;541.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046907&pid=S1405-5546200900010000700016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17.<b> Gilbert, H., H. Handschuh, A. Joux, and S. Vaudenay </b>(2000). A statistical attack on rc6. <i>in FSE 2000, Proceedings, </i>Volume 1978 of <i>Lecture Notes in Computer Science, </i>pp. 64&#150;74. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046908&pid=S1405-5546200900010000700017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">18.<b> Good, T. and M. Benaissa </b>(2005). Aes on fpga from the fastest to the smallest. In <i>CHES 2005, Proceedings, </i>Volume 3659 <i>of Lecture Notes in Computer Science, </i>pp. 427&#150;440. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046909&pid=S1405-5546200900010000700018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">19.<b> Handschuh, H. and H. Gilbert </b>(1997). <i>X</i><sup>2</sup> cryptanalysis of the seal encryption algorithm. In <i>FSE 1997, Proceedings, </i>Volume 1267 of <i>Lecture Notes in Computer Science, </i>pp. 1&#150;12. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046910&pid=S1405-5546200900010000700019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">20.<b> Hellman, M. </b>(1980). A cryptanalytic time&#150;memory trade&#150;off. <i>IEEE Transactions on Information Theory 26, </i>401&#150;406.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046911&pid=S1405-5546200900010000700020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">21.<b> Hong, J. and P. Sarkar </b>(2005). New applications of time memory data tradeoffs. <i>In Asiacrypt 2005, Proceedings, </i>Volume 3788 <i>of Lecture Notes in Computer Science, </i>pp. 353&#150;372. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046912&pid=S1405-5546200900010000700021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">22.<b> Kumar, S., C. Paar, J. Pelzl, G. Pfeiffer, and M. Schimmler </b>(2006). Breaking ciphers with copacobana&#150;a cost&#150;optimized parallel code breaker. In <i>CHES 2006, Proceedings, </i>Volume 4249 of <i>Lecture Notes in Computer Science, pp. </i>101&#150;118. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046913&pid=S1405-5546200900010000700022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">23.<b> Lai, X.</b> (1994). Higher order derivatives and differential cryptanalysis. <i>Communication and Cryptography, </i>227&#150;233.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046914&pid=S1405-5546200900010000700023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">24.<b> Matsui, M. </b>(1993). Linear cryptanalysis method for des cipher. In <i>Eurocrypt 1993, Proceedings, </i>Volume 765 of <i>Lecture Notes in Computer Science, </i>pp. 386&#150;397. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046915&pid=S1405-5546200900010000700024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">25.<b> Matsui, M. </b>(1994). The first experimental cryptanalysis of the data encryption standard. In <i>Crypto 1994, Proceedings, </i>Volume 839 <i>of Lecture Notes in Computer Science, </i>pp. 1&#150;11. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046916&pid=S1405-5546200900010000700025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">26.<b> Mentens, N.</b>, <b>L. Batina, B. Preneel, and I. Verbauwhede </b>(2005). Cracking unix passwords using fpga platforms. In <i>SHARCS 2005, Proceedings.</i></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046917&pid=S1405-5546200900010000700026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">27.<b> Mukhopadhyay, S. and P. Sarkar </b>(2006). Application of lfsrs for parallel sequence generation in cryptologic algorithms. <i>In Applied Cryptography and Information Security 2006 (ACIS'06) in conjunction with ICCSA 2006, Proceedings, </i>Volume 3982 <i>of Lecture Notes in Computer Science, </i>pp. 426&#150;435. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046918&pid=S1405-5546200900010000700027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">28.<b> Oechslin, P. </b>(2003). Making a faster cryptanalytic time&#150;memory trade&#150;off. In <i>Crypto 2003, Proceedings, </i>Volume 2729 <i>of Lecture Notes in Computer Science, </i>pp. 617&#150;630. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046919&pid=S1405-5546200900010000700028&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">29.<b> Quisquater, J. and J. Delescaille </b>(1989). How easy is collision search? application to des. In <i>Eurocrypt 1989, Proceedings, </i>Volume 434 <i>of Lecture Notes in Computer Science, </i>pp. 429&#150;434. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046920&pid=S1405-5546200900010000700029&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">30.<b> Quisquater, J. and F. Standaert </b>(2005). Exhaustive key search of the des: Updates and refinements. In <i>SHARCS 2005, Proceedings.</i></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046921&pid=S1405-5546200900010000700030&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">31.<b> Quisquater, J., F. Standaert, G. Rouvroy, J. David, and J. Legat </b>(2002). A cryptanalytic time&#150;memory tradeoff: First fpga implementation. <i>inFPL 2002, Proceedings, </i>Volume 2438 of <i>Lecture Notes in Computer Science, </i>pp. 780&#150;789. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046922&pid=S1405-5546200900010000700031&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">32.<b> Shimoyama, T., M. Takenaka, and T. Koshiba </b>(2002). Multiple linear cryptanalysis of a reduced round rc6. In <i>FSE 2002, Proceedings, </i>Volume 2365 <i>of Lecture Notes in Computer Science, </i>pp. 76&#150;88. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046923&pid=S1405-5546200900010000700032&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">33.<b> Shimoyama, T., M. Takeuchi, and J. Hayakawa </b>(2002). Correlation attack to the block cipher rc5 and simplified variants of rc6. In <i>3rd AES Candidate Conference.</i></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046924&pid=S1405-5546200900010000700033&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">34.<b> Wagner, D.</b> (1999). The boomerang attack. <i>InFSE 1999, Proceedings, </i>Volume 1636 of <i>Lecture Notes in Computer Science, </i>pp. 156&#150;170. Springer.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046925&pid=S1405-5546200900010000700034&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">35. <b>Wiener, M. </b>(1996). Efficient des key search. In <i>Crypto 1993 (rump session presentation). </i>Reprint in Practical Cryptography for Data Internetworks, William Stallings editor IEEE Computer Society Press, pp. 31&#150;79, 1996.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046926&pid=S1405-5546200900010000700035&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">36.<b> Wiener, M. </b>(2004). The full cost of cryptanalytic attacks. <i>Journal of Cryptology 1</i>7(2), 105&#150;124.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2046927&pid=S1405-5546200900010000700036&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<collab>3GPP</collab>
<source><![CDATA[3rd generation partnership program]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<collab>3GPP</collab>
<source><![CDATA[3gpp ts 55.215 v6.2.0 (2003-09), a5/3 and gea3 specifications]]></source>
<year>2003</year>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amirazizi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hellman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Time-memory-processor trade-offs]]></article-title>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>1988</year>
<volume>34</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>505-512</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biham]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[New types of cryptanaly tic attacks using related keys]]></article-title>
<source><![CDATA[Journal of Cryptology]]></source>
<year>1994</year>
<volume>7</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>229-246</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biham]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Biryukov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials]]></article-title>
<source><![CDATA[]]></source>
<year>1999</year>
<volume>1592</volume>
<conf-name><![CDATA[ EurocryptProceedings]]></conf-name>
<conf-date>1999</conf-date>
<conf-loc> </conf-loc>
<page-range>12-23</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biham]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Biryukov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Miss in the middle attacks on idea and khufu]]></article-title>
<source><![CDATA[]]></source>
<year>1999</year>
<volume>1636</volume>
<conf-name><![CDATA[ FSEProceedings]]></conf-name>
<conf-date>1999</conf-date>
<conf-loc> </conf-loc>
<page-range>124-138</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biham]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Differential Cryptanalysis of the Data Encryption Standard]]></source>
<year>1993</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biryukov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Some thoughts on time-memory -data tradeoffs]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biryukov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cyptanalytic time/memory/data tradeoffs for stream ciphers]]></article-title>
<source><![CDATA[]]></source>
<year>2000</year>
<volume>1976</volume>
<conf-name><![CDATA[ AsiacryptProceedings]]></conf-name>
<conf-date>2000</conf-date>
<conf-loc> </conf-loc>
<page-range>1-13</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biryukov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Wagner]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Slide attack]]></article-title>
<source><![CDATA[]]></source>
<year>1999</year>
<volume>1636</volume>
<conf-name><![CDATA[ FSEProceedings]]></conf-name>
<conf-date>1999</conf-date>
<conf-loc> </conf-loc>
<page-range>245-259</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borst]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Preneel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Vandewalle]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Linear cryptanalysis of rc5 and rc6]]></article-title>
<source><![CDATA[]]></source>
<year>1999</year>
<volume>1636</volume>
<conf-name><![CDATA[ FSEProceedings]]></conf-name>
<conf-date>1999</conf-date>
<conf-loc> </conf-loc>
<page-range>16-30</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<collab>COPACOPANA</collab>
<source><![CDATA[A codebreakerfor des and other ciphers]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Denning]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptography and data security]]></source>
<year>1982</year>
<publisher-name><![CDATA[Addison Wesley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<collab>EFF</collab>
<source><![CDATA[Electronics Frontier Foundation: Cracking DES]]></source>
<year>1998</year>
<publisher-name><![CDATA[O'Reilly and Associates]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="">
<collab>ETSI/SAGE</collab>
<source><![CDATA[Specification of the a5/3 encryption algorithms for gsm and edge, and the gea3 encryption algorithm for gprs, document 1: A5/3 and gea 3 specifications]]></source>
<year>2002</year>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fiat]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Naor]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Rigorous time/space tradeoffs for inverting functions]]></article-title>
<source><![CDATA[STOC]]></source>
<year>1991</year>
<month>19</month>
<day>91</day>
<page-range>534-541</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gilbert]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Handschuh]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Joux]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vaudenay]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A statistical attack on rc6]]></article-title>
<source><![CDATA[]]></source>
<year>2000</year>
<volume>1978</volume>
<conf-name><![CDATA[ FSE]]></conf-name>
<conf-date>2000</conf-date>
<conf-loc> </conf-loc>
<page-range>64-74</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Good]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Benaissa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Aes on fpga from the fastest to the smallest]]></article-title>
<source><![CDATA[]]></source>
<year>2005</year>
<volume>3659</volume>
<conf-name><![CDATA[ CHESProceedings]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc> </conf-loc>
<page-range>427-440</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Handschuh]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Gilbert]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[X² cryptanalysis of the seal encryption algorithm]]></article-title>
<source><![CDATA[]]></source>
<year>1997</year>
<volume>1267</volume>
<conf-name><![CDATA[ FSEProceedings]]></conf-name>
<conf-date>1997</conf-date>
<conf-loc> </conf-loc>
<page-range>1-12</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hellman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A cryptanalytic time-memory trade-off]]></article-title>
<source><![CDATA[IEEE Transactions on Information Theory]]></source>
<year>1980</year>
<numero>26</numero>
<issue>26</issue>
<page-range>401-406</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[New applications of time memory data tradeoffs]]></article-title>
<source><![CDATA[]]></source>
<year>2005</year>
<volume>3788</volume>
<conf-name><![CDATA[ AsiacryptProceedings]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc> </conf-loc>
<page-range>353-372</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Paar]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pelzl]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pfeiffer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Schimmler]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Breaking ciphers with copacobana-a cost-optimized parallel code breaker]]></article-title>
<source><![CDATA[]]></source>
<year>2006</year>
<volume>4249</volume>
<conf-name><![CDATA[ CHESProceedings]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc> </conf-loc>
<page-range>101-118</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Higher order derivatives and differential cryptanalysis]]></article-title>
<source><![CDATA[Communication and Cryptography]]></source>
<year>1994</year>
<page-range>227-233</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matsui]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Linear cryptanalysis method for des cipher]]></article-title>
<source><![CDATA[]]></source>
<year>1993</year>
<volume>765</volume>
<conf-name><![CDATA[ EurocryptProceedings]]></conf-name>
<conf-date>1993</conf-date>
<conf-loc> </conf-loc>
<page-range>386-397</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matsui]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The first experimental cryptanalysis of the data encryption standard]]></article-title>
<source><![CDATA[]]></source>
<year>1994</year>
<volume>839</volume>
<conf-name><![CDATA[ CryptoProceedings]]></conf-name>
<conf-date>1994</conf-date>
<conf-loc> </conf-loc>
<page-range>1-11</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mentens]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Batina]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Preneel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Verbauwhede]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cracking unix passwords using fpga platforms]]></article-title>
<source><![CDATA[]]></source>
<year>2005</year>
<conf-name><![CDATA[ SHARCSProceedings]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mukhopadhyay]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Application of lfsrs for parallel sequence generation in cryptologic algorithms]]></article-title>
<source><![CDATA[]]></source>
<year>2006</year>
<volume>3982</volume>
<conf-name><![CDATA[ Applied Cryptography and Information SecurityICCSAProceedings]]></conf-name>
<conf-date>2006</conf-date><conf-date>2006</conf-date>
<conf-loc> </conf-loc>
<page-range>426-435</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oechslin]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Making a faster cryptanalytic time-memory trade-off]]></article-title>
<source><![CDATA[]]></source>
<year>2003</year>
<volume>2729</volume>
<conf-name><![CDATA[ CryptoProceedings]]></conf-name>
<conf-date>2003</conf-date>
<conf-loc> </conf-loc>
<page-range>617-630</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quisquater]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Delescaille]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[How easy is collision search? application to des]]></article-title>
<source><![CDATA[]]></source>
<year>1989</year>
<volume>434</volume>
<conf-name><![CDATA[ EurocryptProceedings]]></conf-name>
<conf-date>1989</conf-date>
<conf-loc> </conf-loc>
<page-range>429-434</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quisquater]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Exhaustive key search of the des: Updates and refinements]]></article-title>
<source><![CDATA[]]></source>
<year>2005</year>
<conf-name><![CDATA[ SHARCSProceedings]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quisquater]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Rouvroy]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[David]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Legat]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A cryptanalytic time-memory tradeoff: First fpga implementation]]></article-title>
<source><![CDATA[]]></source>
<year>2002</year>
<volume>2438</volume>
<conf-name><![CDATA[ FPLProceedings]]></conf-name>
<conf-date>2002</conf-date>
<conf-loc> </conf-loc>
<page-range>780-789</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shimoyama]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Takenaka]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Koshiba]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Multiple linear cryptanalysis of a reduced round rc6]]></article-title>
<source><![CDATA[]]></source>
<year>2002</year>
<volume>2365</volume>
<conf-name><![CDATA[ FSEProceedings]]></conf-name>
<conf-date>2002</conf-date>
<conf-loc> </conf-loc>
<page-range>76-88</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shimoyama]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Takeuchi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hayakawa]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Correlation attack to the block cipher rc5 and simplified variants of rc6]]></article-title>
<source><![CDATA[]]></source>
<year>2002</year>
<conf-name><![CDATA[3rd AES Candidate Conference]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wagner]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The boomerang attack]]></article-title>
<source><![CDATA[]]></source>
<year>1999</year>
<volume>1636</volume>
<conf-name><![CDATA[ FSEProceedings]]></conf-name>
<conf-date>1999</conf-date>
<conf-loc> </conf-loc>
<page-range>156-170</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wiener]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Efficient des key search]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Stallings]]></surname>
<given-names><![CDATA[William]]></given-names>
</name>
</person-group>
<source><![CDATA[]]></source>
<year>1996</year>
<month>19</month>
<day>96</day>
<conf-name><![CDATA[ Crypto]]></conf-name>
<conf-date>1993</conf-date>
<conf-loc> </conf-loc>
<page-range>31-79</page-range><publisher-name><![CDATA[IEEE Computer Society Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wiener]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The full cost of cryptanalytic attacks]]></article-title>
<source><![CDATA[Journal of Cryptology]]></source>
<year>2004</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>105-124</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
