A parallel time-memory tradeoff attack on the Hill cipher.
Tim McDevittJessica LehrTing GuPublished in: Cryptologia (2018)
Keyphrases
- parallel hardware
- block cipher
- encryption algorithm
- parallel processing
- memory usage
- distributed shared memory
- data corruption
- countermeasures
- ciphertext
- memory footprint
- multi threaded
- parallel computing
- computational power
- computing power
- computational complexity
- processing elements
- multithreading
- parallel implementation
- memory size
- shared memory
- level parallelism
- secret key
- compute intensive
- message passing
- memory requirements
- main memory