-
1
-
-
33644914043
-
Smaller explicit superconcentrators
-
Alon, N., Capalbo, M.R.: Noga Alon and Michael R. Capalbo. Smaller explicit superconcentrators. Internet Mathematics 1(2), 151-163 (2003)
-
(2003)
Internet Mathematics
, vol.1
, Issue.2
, pp. 151-163
-
-
Alon, N.1
Capalbo, M.R.2
Alon, N.3
Capalbo, M.R.4
-
2
-
-
84927671041
-
Proofs of space: When space is of the essence. Cryptology ePrint Archive
-
Ateniese, G., Bonacina, I., Faonio, A., Galesi, N.: Proofs of space: When space is of the essence. Cryptology ePrint Archive, Report 2013/805 (2013), http://eprint.iacr.org/
-
(2013)
Report 2013/805
-
-
Ateniese, G.1
Bonacina, I.2
Faonio, A.3
Galesi, N.4
-
3
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: ACM Conference on Computer and Communications Security, pp. 400-409 (2009)
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 400-409
-
-
Castelluccia, C.1
Francillon, A.2
Perito, D.3
Soriente, C.4
-
4
-
-
77956997411
-
Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
De, A., Trevisan, L., Tulsiani, M.: Time Space Tradeoffs for Attacks against One-Way Functions and PRGs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 649-665. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 649-665
-
-
De, A.1
Trevisan, L.2
Tulsiani, M.3
-
5
-
-
84943235829
-
Pricing via Processing or Combatting Junk Mail
-
In: Brickell, E.F. (ed.), Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992. LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
6
-
-
84927624537
-
Proofs of space. Cryptology ePrint Archive
-
Dziembowski, S., Faust, S., Kolmogorov, V., Pietrzak, K.: Proofs of space. Cryptology ePrint Archive, Report 2013/796 (2013), http://eprint.iacr.org/
-
(2013)
Report 2013/796
-
-
Dziembowski, S.1
Faust, S.2
Kolmogorov, V.3
Pietrzak, K.4
-
7
-
-
79953231613
-
One-Time Computable Self-erasing Functions
-
In: Ishai, Y. (ed.), Springer, Heidelberg
-
Dziembowski, S., Kazana, T., Wichs, D.: One-Time Computable Self-erasing Functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 125-143. Springer, Heidelberg (2011)
-
(2011)
TCC 2011. LNCS
, vol.6597
, pp. 125-143
-
-
Dziembowski, S.1
Kazana, T.2
Wichs, D.3
-
8
-
-
0033294770
-
Rigorous time/space trade-offs for inverting functions
-
Fiat, A., Naor, M.: Rigorous time/space trade-offs for inverting functions. SIAM J. Comput. 29(3), 790-803 (1999)
-
(1999)
SIAM J. Comput
, vol.29
, Issue.3
, pp. 790-803
-
-
Fiat, A.1
Naor, M.2
-
9
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
Martin, E.: A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory 26(4), 401-406 (1980)
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.4
, pp. 401-406
-
-
Martin, E.1
-
10
-
-
0016047180
-
Computing partitions with applications to the knapsack problem
-
Horowitz, E., Sahni, S.: Computing partitions with applications to the knapsack problem. J. ACM 21(2), 277-292 (1974)
-
(1974)
J. ACM
, vol.21
, Issue.2
, pp. 277-292
-
-
Horowitz, E.1
Sahni, S.2
-
11
-
-
84927635141
-
-
New wine into old wineskins: A survey of some pebbling classics with supplemental results
-
Nordstrom, J.: New wine into old wineskins: A survey of some pebbling classics with supplemental results (2011)
-
(2011)
-
-
Nordstrom, J.1
-
12
-
-
84943730406
-
Space bounds for a game of graphs
-
Chandra, A.K., Wotschke, D., Friedman, E.P., Harrison, M.A. (eds.)
-
Paul, W.J., Tarjan, R.E., Celoni, J.R.: Space bounds for a game of graphs. In: Chandra, A.K., Wotschke, D., Friedman, E.P., Harrison, M.A. (eds.) STOC, pp. 149-160. ACM (1976)
-
(1976)
STOC
, pp. 149-160
-
-
Paul, W.J.1
Tarjan, R.E.2
Celoni, J.R.3
-
13
-
-
78049363496
-
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
-
In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.), Springer, Heidelberg
-
Perito, D., Tsudik, G.: Secure Code Update for Embedded Devices via Proofs of Secure Erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643-662. Springer, Heidelberg (2010)
-
(2010)
ESORICS 2010. LNCS,
, vol.6345
, pp. 643-662
-
-
Perito, D.1
Tsudik, G.2
-
14
-
-
84927614192
-
Near-linear time, leakage-resilient key evolution schemes from expander graphs. Cryptology ePrint Archive
-
Smith, A., Zhang, Y.: Near-linear time, leakage-resilient key evolution schemes from expander graphs. Cryptology ePrint Archive, Report 2013/864 (2013), http://eprint.iacr.org/
-
(2013)
Report 2013/864
-
-
Smith, A.1
Zhang, Y.2
|