<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:36:03.289Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:52" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:52</identifier>
                <datestamp>2013-10-18T12:02:40Z</datestamp>
                <setSpec>2</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">An analysis of chain characteristics in the cryptanalytic TMTO</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2013</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/2/52</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-5187-6254" confidence="-1">V. Tomašević</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:171" confidence="-1">M. Tomašević</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">The classical Hellman’s cryptanalytic time–memory trade-off method and its later enhancements notoriously suffer from false alarm phenomena, which are the consequence of&#xD;
multiple occurrences of keys in Hellman chains. These detrimental situations can be avoided if the record of the keys already included into chains is kept during the generation&#xD;
of chains in the precomputation phase which guarantees perfect chains without key repetitions. The paper presents the theoretical and practical analysis that determines&#xD;
relevant characteristics of the perfect chains such as the probabilities that a chain will be of a certain length, the number of chains, their average lengths, as well as the coverage of the key space. In order to obtain these indicators, a detailed probabilistic analytical model&#xD;
is developed which treats the chain generation as a random process. The close matching of the model outputs to the numerical results obtained by the simulation experiments for&#xD;
different sizes of the key space proved the validity of the model. The numerical results are discussed in detail and the conclusions are finally drawn.</dim:field>
                    <dim:field mdschema="dc" element="type">article</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">52</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">61</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="issn">0304-3975</dim:field>
                    <dim:field mdschema="dc" element="source">THEORETICAL COMPUTER SCIENCE</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
