A Time-Memory Tradeoff Attack Against LILI-128.
Markku-Juhani Olavi SaarinenPublished in: IACR Cryptol. ePrint Arch. (2001)
Keyphrases
- trade off
- data corruption
- computing power
- memory requirements
- memory usage
- memory space
- computational complexity
- memory capacity
- limited memory
- associative memory
- key exchange protocol
- neural network
- malicious attacks
- memory footprint
- memory size
- random access
- artificial neural networks
- artificial intelligence
- genetic algorithm