Entry Vernitski:2006:CUM from compj2000.bib
Last update: Sun Mar 31 02:13:37 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Vernitski:2006:CUM,
author = "Alexei Vernitski",
title = "Can Unbreakable Mean Incomputable?",
journal = j-COMP-J,
volume = "49",
number = "1",
pages = "108--112",
month = jan,
year = "2006",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/bxh144",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Wed Dec 21 17:38:55 MST 2005",
bibsource = "http://comjnl.oxfordjournals.org/content/vol49/issue1/index.dtl;
http://www.math.utah.edu/pub/tex/bib/compj2000.bib",
URL = "http://comjnl.oxfordjournals.org/cgi/content/abstract/49/1/108;
http://comjnl.oxfordjournals.org/cgi/content/full/49/1/108;
http://comjnl.oxfordjournals.org/cgi/reprint/49/1/108",
abstract = "Among methods of breaking a cipher, exhaustive key
search stands out as the most successful (albeit the
least efficient) method. We demonstrate that various
algorithmic implementations of exhaustive key search
are not equally effective, and cryptosystems can be
devised which make some implementations of exhaustive
key search unsuccessful (in the sense that the problem
these algorithms try to solve turns out to be
incomputable). We observe that there are
implementations of exhaustive key search that are
always successful (i.e. they terminate and generate a
correct result irrespective of the cryptosystem they
are used against). As to those implementations of
exhaustive key search that are not always successful,
we describe them and those cryptosystems that can make
them unsuccessful.",
acknowledgement = ack-nhfb,
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
}
Related entries
- against,
45(3)293,
46(3)307,
49(5)554
- algorithm,
0(0)xii--274,
0(0)xii--304,
0(0)xvii--325,
0(0)x--295,
43(1)81,
43(2)152,
43(4)315,
43(6)482,
44(2)101,
44(3)214,
44(4)292,
44(4)303,
45(1)88,
45(2)174,
45(2)237,
45(3)304,
45(4)423,
45(5)525,
45(5)561,
46(4)391,
46(4)401,
46(4)427,
46(5)498,
46(6)645,
46(6)680,
47(5)602,
47(6)694,
47(6)701,
48(2)220,
48(3)300,
48(4)443,
48(6)650,
48(6)737,
48(6)749,
49(1)42,
49(2)201,
49(2)249,
49(2)252,
49(3)351,
49(3)358,
49(4)418,
49(5)629,
49(6)762,
50(3)332,
50(3)348,
50(4)435,
50(4)473,
50(6)728,
51(1)7,
51(1)26,
51(1)60,
51(1)79,
51(1)122,
51(1)137,
51(3)303,
51(4)451,
51(4)470,
51(6)688,
52(1)90,
52(2)268,
52(6)656,
52(6)690,
1008(0)363
- algorithmic,
47(5)545,
51(1)137,
51(3)292
- breaking,
48(6)642
- cryptosystem,
47(3)320
- demonstrate,
45(6)608
- effective,
49(1)82
- efficient,
43(5)430,
44(1)21,
44(5)340,
44(5)463,
46(4)358,
46(5)476,
46(6)632,
47(2)153,
47(2)169,
47(6)694,
48(4)451,
48(5)588,
49(4)418,
50(3)348,
50(4)444,
50(5)602,
50(6)739,
51(2)192,
51(4)470,
51(6)662
- i.e,
49(1)82
- implementation,
43(4)266,
43(6)512,
45(6)608,
46(1)3,
46(3)263,
46(3)307,
47(2)205,
47(6)728,
48(4)498,
49(4)400,
50(4)478,
50(6)728,
51(1)26,
51(5)585
- key,
44(5)463,
45(6)661,
48(4)480,
49(4)443,
50(1)41,
50(5)589,
50(5)602,
52(6)646
- make,
49(1)82
- method,
0(0)xii--574,
0(0)x--438,
43(4)252,
43(4)301,
45(1)1,
45(1)46,
45(6)608,
46(3)263,
46(3)319,
47(2)270,
48(1)101,
49(5)629,
50(1)68,
50(5)555,
50(6)674,
51(1)26,
52(1)80,
52(1)101,
52(1)126,
52(6)599
- not,
45(6)608,
49(1)82
- problem,
44(2)101,
44(3)214,
45(2)174,
46(4)427,
47(6)708,
48(6)692,
49(1)82,
49(3)345,
49(3)358,
49(5)585,
49(6)665,
50(4)473,
51(1)102,
51(3)303,
51(3)363,
51(3)372,
52(4)499,
52(5)557
- result,
43(6)439,
47(6)627,
49(1)82
- search,
0(0)xxvi--365,
6(0)xiii--198,
43(2)152,
48(2)200,
49(1)128,
49(3)268,
49(4)500
- terminate,
49(1)82
- there,
43(2)95,
48(1)49,
49(1)97,
50(2)232
- used,
49(1)82
- various,
50(2)178
- which,
49(1)97