{"id":"https://openalex.org/W2012646342","doi":"https://doi.org/10.1109/tit.1980.1056220","title":"A cryptanalytic time-memory trade-off","display_name":"A cryptanalytic time-memory trade-off","publication_year":1980,"publication_date":"1980-07-01","ids":{"openalex":"https://openalex.org/W2012646342","doi":"https://doi.org/10.1109/tit.1980.1056220","mag":"2012646342"},"language":"en","primary_location":{"id":"doi:10.1109/tit.1980.1056220","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.1980.1056220","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016990841","display_name":"Martin E. Hellman","orcid":null},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Hellman","raw_affiliation_strings":["Department of Electrical Engineering, University of Stanford, Stanford, CA, USA","[Department of Electrical Engineering, University of Stanford, Stanford, CA, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Stanford, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]},{"raw_affiliation_string":"[Department of Electrical Engineering, University of Stanford, Stanford, CA, USA]","institution_ids":["https://openalex.org/I97018004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5016990841"],"corresponding_institution_ids":["https://openalex.org/I97018004"],"apc_list":null,"apc_paid":null,"fwci":8.6879,"has_fulltext":false,"cited_by_count":691,"citation_normalized_percentile":{"value":0.97208495,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"26","issue":"4","first_page":"401","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5904215574264526},{"id":"https://openalex.org/keywords/precomputation","display_name":"Precomputation","score":0.559038519859314},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.5273100733757019},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4787263572216034},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44847509264945984},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3672406077384949},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3661137819290161},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33767643570899963},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.21804451942443848},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.19076862931251526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09271770715713501}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5904215574264526},{"id":"https://openalex.org/C159379195","wikidata":"https://www.wikidata.org/wiki/Q7239568","display_name":"Precomputation","level":3,"score":0.559038519859314},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.5273100733757019},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4787263572216034},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44847509264945984},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3672406077384949},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3661137819290161},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33767643570899963},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.21804451942443848},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.19076862931251526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09271770715713501}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tit.1980.1056220","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.1980.1056220","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.120.2463","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.2463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www-ee.stanford.edu/~hellman/publications/36.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1981455414","https://openalex.org/W1991374982","https://openalex.org/W2074886859","https://openalex.org/W2086800870","https://openalex.org/W2093996904","https://openalex.org/W2106287110","https://openalex.org/W2156186849","https://openalex.org/W2751862591","https://openalex.org/W2800027815","https://openalex.org/W3198160809"],"related_works":["https://openalex.org/W126258643","https://openalex.org/W2157769033","https://openalex.org/W2096978683","https://openalex.org/W2687399516","https://openalex.org/W2543067032","https://openalex.org/W2170398238","https://openalex.org/W3029113864","https://openalex.org/W2020308516","https://openalex.org/W414359703","https://openalex.org/W4242327143"],"abstract_inverted_index":{"A":[0],"probabilistic":[1],"method":[2,110],"is":[3,122],"presented":[4],"which":[5,30],"cryptanalyzes":[6],"any":[7],"<tex":[8,14,19,32,63,74,103],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[9,15,20,33,64,75,104],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">N</tex>":[10,34,65,76],"key":[11,57],"cryptosystem":[12],"in":[13,42,93,112,129],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">N^{2/3}</tex>":[16,21],"operational":[17],"with":[18,61],"words":[22,77],"of":[23,78],"memory":[24,79],"(average":[25],"values)":[26],"after":[27],"a":[28,43,113,130],"precomputation":[29,38],"requires":[31],"operations.":[35],"If":[36],"the":[37,50,62,73,87],"can":[39,125],"be":[40,127],"performed":[41],"reasonable":[44],"time":[45],"period":[46],"(e.g,":[47],"several":[48],"years),":[49],"additional":[51],"computation":[52],"required":[53,67,80],"to":[54,86],"recover":[55],"each":[56],"compares":[58],"very":[59],"favorably":[60],"operations":[66],"by":[68,81],"an":[69],"exhaustive":[70],"search":[71],"and":[72],"table":[82],"lookup.":[83],"When":[84],"applied":[85],"Data":[88],"Encryption":[89],"Standard":[90],"(DES)":[91],"used":[92,128],"block":[94,120],"mode,":[95],"it":[96],"indicates":[97],"that":[98],"solutions":[99],"should":[100],"cost":[101],"between":[102],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1":[105],"and</tex>":[106],"100":[107],"each.":[108],"The":[109],"works":[111],"chosen":[114],"plaintext":[115],"attack":[116],"and,":[117],"if":[118],"cipher":[119],"chaining":[121],"not":[123],"used,":[124],"also":[126],"ciphertext-only":[131],"attack.":[132]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":34},{"year":2022,"cited_by_count":24},{"year":2021,"cited_by_count":25},{"year":2020,"cited_by_count":24},{"year":2019,"cited_by_count":22},{"year":2018,"cited_by_count":29},{"year":2017,"cited_by_count":32},{"year":2016,"cited_by_count":29},{"year":2015,"cited_by_count":44},{"year":2014,"cited_by_count":32},{"year":2013,"cited_by_count":42},{"year":2012,"cited_by_count":54}],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2025-10-10T00:00:00"}
