[citation needed] In 1980 Martin Hellman first proposed using a time–memory tradeoff for cryptanalysis. A common situation is an algorithm involving a...
6 KB (734 words) - 18:42, 7 June 2025
time/memory/data tradeoff attack is a type of cryptographic attack where an attacker tries to achieve a situation similar to the space–time tradeoff but...
13 KB (2,388 words) - 12:38, 12 March 2025
length of time needed to crack a password drastically. RainbowCrack was developed by Zhu Shuanglei, and implements an improved time–memory tradeoff cryptanalysis...
2 KB (125 words) - 22:55, 26 March 2025
cognitive tradeoff hypothesis argues that in the cognitive evolution of humans, there was an evolutionary tradeoff between short-term working memory and complex...
7 KB (890 words) - 22:42, 18 March 2025
can be cryptanalysed in real time using a time-memory tradeoff attack, based on earlier work by Jovan Golic. One tradeoff allows an attacker to reconstruct...
23 KB (2,725 words) - 00:35, 9 August 2024
Rainbow tables are a practical example of a space–time tradeoff: they use less computer processing time and more storage than a brute-force attack which...
24 KB (3,486 words) - 15:08, 3 July 2025
man-in-the-middle attacks such as replay the hash. Without salt, time–memory tradeoff pre-computed dictionary attacks, such as a rainbow table, are feasible...
20 KB (1,999 words) - 21:57, 6 July 2025
encryption. The technology first appeared in 2007 and employs the time–memory tradeoff method to build pre-computed hash tables, which open the corresponding...
6 KB (594 words) - 15:51, 18 September 2024
(keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext...
23 KB (2,231 words) - 21:32, 1 July 2025
the IV has at best the same size as the key to compensate for time/memory/data tradeoff attacks. When the IV is chosen at random, the probability of collisions...
14 KB (1,797 words) - 08:53, 7 September 2024
different things: In computer science, in-memory processing, also called compute-in-memory (CIM), or processing-in-memory (PIM), is a computer architecture in...
16 KB (1,944 words) - 07:51, 25 May 2025
before compilation, which helps to perform better optimization. The correct tradeoff can vary due to circumstances. For example, Sun's Java virtual machine...
26 KB (3,260 words) - 04:52, 24 June 2025
rate from the phase-change material. Phase-change memory is susceptible to a fundamental tradeoff of unintended vs. intended phase-change. This stems...
41 KB (4,693 words) - 07:06, 27 May 2025
memory for inter-process communications (IPC). The major reason to choose memory mapped file I/O is performance. Nevertheless, there can be tradeoffs...
17 KB (2,011 words) - 16:08, 17 June 2025
Long short-term memory (LSTM) is a type of recurrent neural network (RNN) aimed at mitigating the vanishing gradient problem commonly encountered by traditional...
52 KB (5,822 words) - 23:27, 12 July 2025
Recurrent neural network (redirect from Real-time recurrent learning)
recurrent unit, which maintains a hidden state—a form of memory that is updated at each time step based on the current input and the previous hidden state...
90 KB (10,417 words) - 11:29, 11 July 2025
Jonathan; Inside memory management – The choices, tradeoffs, and implementations of dynamic allocation Memory Reduction (GNOME) wiki page with much information...
36 KB (4,141 words) - 04:19, 26 June 2025
Key stretching (section Strength and time)
this attack remains vulnerable if unprotected against certain time-memory tradeoffs such as developing rainbow tables to target multiple instances of...
14 KB (1,816 words) - 18:13, 2 July 2025
both "voice-based" and "screen-based" search that will establish a time-memory tradeoff in the implementation process of fast-evolving mobile equipment....
12 KB (1,651 words) - 12:21, 7 December 2023
from random data. Block cipher Hash function security summary Time/memory/data tradeoff attack Transport Layer Security Bullrun (decryption program) —...
15 KB (801 words) - 01:34, 22 August 2024
Magnetoresistive RAM (redirect from Magnetic Random Access Memory)
Magnetoresistive random-access memory (MRAM) is a type of non-volatile random-access memory which stores data in magnetic domains. Developed in the mid-1980s...
47 KB (5,352 words) - 05:49, 19 April 2025
Overhead (computing) (section Tradeoffs)
provide low space overhead, but at the cost of slow performance (space/time tradeoff). Algorithmic complexity is generally specified using Big O notation...
7 KB (831 words) - 15:50, 30 December 2024
outside of the in-memory data grid industry, where systems are localized to geographic regions and the latency vs. consistency tradeoff is not significant...
13 KB (1,386 words) - 11:48, 25 May 2025
q^{\frac {k}{2}}} for memory-efficient implementations. Alcock and Ren refute Equihash’s security claims, concluding that no tradeoff-resistance bound is...
6 KB (737 words) - 18:44, 23 June 2025
Mental chronometry (redirect from Reaction time)
tradeoffs, mixture models, convolution models, stochastic orders related comparisons, and the mathematical modeling of stochastic variation in timed responses...
96 KB (11,533 words) - 23:00, 10 July 2025
2023-09-30. Biryukov, Alex; Khovratovich, Dmitry (2015). "Tradeoff Cryptanalysis of Memory-Hard Functions". In Iwata, Tetsu; Cheon, Jung Hee (eds.). Advances...
7 KB (825 words) - 20:22, 12 May 2025
Systems". CiteSeerX 10.1.1.103.4903. Goodson, Garth; Iyer, Rahul. "Design Tradeoffs in a Flash Translation Layer" (PDF). Archived from the original (PDF)...
8 KB (972 words) - 17:38, 3 February 2025
Cache control instruction (section Scratchpad memory)
throughput vs latency tradeoff, and may prefer to devote more area to execution units. Some processors support scratchpad memory into which temporaries...
7 KB (839 words) - 08:06, 25 February 2025
of a space-time tradeoff. If memory is infinite, the entire key can be used directly as an index to locate its value with a single memory access. On the...
54 KB (6,078 words) - 03:50, 19 June 2025