Full Text Available
Note: Clicking the button above will open the full text document at the original institutional repository in a new window.
| Published in: | Journal of Cryptographic Engineering |
|---|---|
| Format: | Online Article RSS Article |
| Published: |
2026
|
| Subjects: | |
| Tags: |
No Tags, Be the first to tag this record!
|
| _version_ | 1864030192996974596 |
|---|---|
| collection | WordPress RSS FRELIP Feed Integration |
| container_title | Journal of Cryptographic Engineering |
| description | |
| discipline_display | Technology & Engineering |
| discipline_facet | Technology & Engineering |
| format | Online Article RSS Article |
| genre | Journal Article |
| id | rss_article:47104 |
| institution | FRELIP |
| journal_source_facet | Journal of Cryptographic Engineering |
| publishDate | 2026 |
| publishDateSort | 2026 |
| record_format | rss_article |
| spellingShingle | Ascending stepped cryptanalytic time-memory trade-off Computer and Cyber Security Technology & Engineering — Computing Technology & Engineering |
| sub_discipline_display | Technology & Engineering — Computing |
| sub_discipline_facet | Technology & Engineering — Computing |
| subject_display | Computer and Cyber Security Technology & Engineering — Computing Technology & Engineering Computer and Cyber Security Technology & Engineering — Computing Technology & Engineering |
| subject_facet | Computer and Cyber Security Technology & Engineering — Computing Technology & Engineering |
| title | Ascending stepped cryptanalytic time-memory trade-off |
| title_auth | Ascending stepped cryptanalytic time-memory trade-off |
| title_full | Ascending stepped cryptanalytic time-memory trade-off |
| title_fullStr | Ascending stepped cryptanalytic time-memory trade-off |
| title_full_unstemmed | Ascending stepped cryptanalytic time-memory trade-off |
| title_short | Ascending stepped cryptanalytic time-memory trade-off |
| title_sort | ascending stepped cryptanalytic time-memory trade-off |
| topic | Computer and Cyber Security Technology & Engineering — Computing Technology & Engineering |
| url | https://link.springer.com/article/10.1007/s13389-026-00391-1 |