[PDF][PDF] Security Issues and Attacks on the GSM Standard: a Review.

G Cattaneo, G De Maio, UF Petrillo - J. Univers. Comput. Sci., 2013 - academia.edu
The Global Systems for Mobile communications (GSM) is actually the most widespread
mobile communication technology existing nowadays. Despite being a mature technology …

A review of security attacks on the GSM standard

G Cattaneo, G De Maio, P Faruolo… - … Conference, ICT-EurAsia …, 2013 - Springer
Abstract The Global Systems for Mobile communications (GSM) is the most widespread
mobile communication technology existing nowadays. Despite being a mature technology …

Rainbow Tables: How Far Can CPU Go?

G Avoine, X Carpent… - The Computer Journal, 2023 - academic.oup.com
Rainbow tables are techniques commonly used in computer security to invert one-way
functions, for instance to crack passwords, when the domain of definition is reasonably …

Stairway to rainbow

G Avoine, X Carpent, D Leblanc-Albarel - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
A cryptanalytic time-memory trade-off is a technique introduced by M. Hellman in 1980 to
perform brute-force attacks. It consists of a time-consuming precomputation phase …

High-speed implementation of rainbow table method on heterogeneous multi-device architecture

P Li, W Zhu, J Chen, S Yao, CF Hsu, G Xiong - Future Generation …, 2023 - Elsevier
Heterogeneous multi-device architecture has been widely used to solve computationally
intensive problems. This paper proposes a high-speed implementation of the rainbow table …

Analysis of the non-perfect table fuzzy rainbow tradeoff

BI Kim, J Hong - Australasian Conference on Information Security and …, 2013 - Springer
Time memory tradeoff algorithms are tools for inverting one-way functions, and they are
often used to recover passwords from unsalted password hashes. There are many publicly …

Analysis of rainbow tables with fingerprints

G Avoine, A Bourgeois, X Carpent - … , QLD, Australia, June 29--July 1, 2015 …, 2015 - Springer
Cryptanalytic time-memory tradeoffs were introduced by Martin Hellman in 1980 to perform
key-recovery attacks on cryptosystems. Rainbow tables are a variant and a major advance …

Precomputation for rainbow tables has never been so fast

G Avoine, X Carpent, D Leblanc-Albarel - … 4–8, 2021, Proceedings, Part II …, 2021 - Springer
Cryptanalytic time-memory trade-offs (TMTOs) are techniques commonly used in computer
security eg, to crack passwords. However, TMTOs usually encounter in practice a bottleneck …

Optimal storage for rainbow tables

G Avoine, X Carpent - Information Security and Cryptology--ICISC 2013 …, 2014 - Springer
Cryptanalytic time-memory trade-offs were introduced by Martin Hellman in 1980, and they
have since had a major impact on practical cryptanalysis. Hellman's technique has been …

Heterogeneous rainbow table widths provide faster cryptanalyses

G Avoine, X Carpent - Proceedings of the 2017 ACM on Asia Conference …, 2017 - dl.acm.org
Cryptanalytic time-memory trade-offs are techniques introduced by Hellman in 1980 to
speed up exhaustive searches. Oechslin improved the original version with the introduction …