-
2
-
-
0037517134
-
DoS-resistant authentication with client puzzles
-
Cambridge, pp, April
-
Aura, T., Nikander, P., Leiwo, J.: DoS-resistant authentication with client puzzles. In: Security Protocols Workshop 2000, Cambridge, pp. 170-181 (April 2000)
-
(2000)
Security Protocols Workshop
, pp. 170-181
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
4
-
-
0000951613
-
Improved low-density subset sum algorithms
-
Coster, M.J., Joux, A., LaMacchia, B.A., Odlyzko, A.M., Schnorr, C., Stern, J.: Improved low-density subset sum algorithms. Computational Complexity 2(2), 111-128 (1992)
-
(1992)
Computational Complexity
, vol.2
, Issue.2
, pp. 111-128
-
-
Coster, M.J.1
Joux, A.2
LaMacchia, B.A.3
Odlyzko, A.M.4
Schnorr, C.5
Stern, J.6
-
5
-
-
84943235829
-
Pricing via Processing or Combatting Junk Mail
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
6
-
-
25644445353
-
The Design and Implementation of Network Layer Puzzles
-
March 13-17
-
Feng, W., Kaiser, E., Feng, W., Luu, A.: The Design and Implementation of Network Layer Puzzles. In: Proceedings of IEEE Infocom 2005 (March 13-17, 2005)
-
(2005)
Proceedings of IEEE Infocom 2005
-
-
Feng, W.1
Kaiser, E.2
Feng, W.3
Luu, A.4
-
7
-
-
33845392173
-
Scalable, Fine-grained Control of Network Puzzles
-
Technical report 03-015, OGI CSE
-
Feng, W., Luu, A., Feng, W.: Scalable, Fine-grained Control of Network Puzzles. Technical report 03-015, OGI CSE (2003)
-
(2003)
-
-
Feng, W.1
Luu, A.2
Feng, W.3
-
8
-
-
38349007437
-
Efficient Trapdoor-Based Client Puzzle System against DoS Attacks
-
School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia
-
Gao, Y.: Efficient Trapdoor-Based Client Puzzle System against DoS Attacks. In: Master of Computer Science by Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia (2005)
-
(2005)
Master of Computer Science by Research
-
-
Gao, Y.1
-
9
-
-
38349064026
-
On Chained Cryptographic Puzzles
-
Timisoara, Romania, pp, May
-
Groza, B., Petrica, D.: On Chained Cryptographic Puzzles. In: 3rd Romanian-Hungarian Joint Symposium on Applied Computational Intelligence (SACI), Timisoara, Romania, pp. 25-26 (May 2006)
-
(2006)
3rd Romanian-Hungarian Joint Symposium on Applied Computational Intelligence (SACI)
, pp. 25-26
-
-
Groza, B.1
Petrica, D.2
-
10
-
-
84861587712
-
Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks
-
San Diego, California, USA, pp, Internet Society Press, Reston
-
Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks. In: NDSS 1999. The 1999 Network and Distributed System Security Symposium, San Diego, California, USA, pp. 151-165. Internet Society Press, Reston (1999)
-
(1999)
NDSS 1999. The 1999 Network and Distributed System Security Symposium
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
12
-
-
0347860340
-
-
Master Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
-
LaMacchia, B.A.: Basis Reduction Algorithms and Subset Sum Problems. Master Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (1991)
-
(1991)
Basis Reduction Algorithms and Subset Sum Problems
-
-
LaMacchia, B.A.1
-
13
-
-
34250244723
-
Factoring Polynomials with Rational Coefficients
-
Lenstra, A.K., Lenstra Jr., H.W., Lovász, L.: Factoring Polynomials with Rational Coefficients. Mathematische Annalen 261(4), 515-534 (1982)
-
(1982)
Mathematische Annalen
, vol.261
, Issue.4
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra Jr., H.W.2
Lovász, L.3
-
16
-
-
3142619105
-
-
Internet Draft, Internet Engineering Task Force October
-
Moskowitz, R.: The Host Identity Protocol (HIP). Internet Draft, Internet Engineering Task Force (October 2007), http://www.ietf.org/internet-drafts/ draft-ietf-hip-base-09.txt
-
(2007)
The Host Identity Protocol (HIP)
-
-
Moskowitz, R.1
-
17
-
-
38349023774
-
-
Price, G.: A General Attack Model on Hash-Based Client Puzzles. In: 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, pp. 16-18. Springer, Heidelberg (2003)
-
Price, G.: A General Attack Model on Hash-Based Client Puzzles. In: 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, pp. 16-18. Springer, Heidelberg (2003)
-
-
-
-
19
-
-
0010602889
-
Time-lock Puzzles and Timed-release Crypto
-
Technical Report TR-684, Massachusetts Institute of Technology, Cambridge, MA, USA March 10
-
Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock Puzzles and Timed-release Crypto. Technical Report TR-684, Massachusetts Institute of Technology, Cambridge, MA, USA (March 10, 1996)
-
(1996)
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
20
-
-
84855206587
-
Fast LLL-type Lattice Reduction
-
Schnorr, C.P.: Fast LLL-type Lattice Reduction. Information and Computation 204(1), 1-25 (2006)
-
(2006)
Information and Computation
, vol.204
, Issue.1
, pp. 1-25
-
-
Schnorr, C.P.1
-
21
-
-
85029774337
-
-
Schnorr, C.P., Euchner, M.: Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems. In: Budach, L. (ed.) FCT 1991. LNCS, 529, pp. 68-85. Springer, Heidelberg (1991)
-
Schnorr, C.P., Euchner, M.: Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems. In: Budach, L. (ed.) FCT 1991. LNCS, vol. 529, pp. 68-85. Springer, Heidelberg (1991)
-
-
-
-
24
-
-
0038825046
-
Defending Against Denial-of-Service Attacks with Puzzle Auctions (Extended Abstract)
-
Berkeley, CA, USA, pp, May 11-13
-
Wang, X., Reiter, M.K.: Defending Against Denial-of-Service Attacks with Puzzle Auctions (Extended Abstract). In: SP 2003. The 2003 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 78-92 (May 11-13, 2003)
-
(2003)
SP 2003. The 2003 IEEE Symposium on Security and Privacy
, pp. 78-92
-
-
Wang, X.1
Reiter, M.K.2
-
25
-
-
14844300104
-
New Client Puzzle Outsourcing Techniques for DoS Resistance
-
ACM Press, Washington DC
-
Waters, B., Juels, A., Halderman, J.A., Felten, E.W.: New Client Puzzle Outsourcing Techniques for DoS Resistance. In: CCS 2004. The 11th ACM Conference on Computer and Communications Security, pp. 246-256. ACM Press, Washington DC (2004)
-
(2004)
CCS 2004. The 11th ACM Conference on Computer and Communications Security
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
|