메뉴 건너뛰기




Volumn 8642, Issue , 2014, Pages 520-537

Efficient proofs of secure erasure

Author keywords

Graph Pebbling; Space bounded adversaries; Time Space Tradeoffs

Indexed keywords

CHROMIUM COMPOUNDS; COMPLEX NETWORKS; CRYPTOGRAPHY;

EID: 84927615559     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-10879-7_30     Document Type: Conference Paper
Times cited : (25)

References (14)
  • 2
    • 84927671041 scopus 로고    scopus 로고
    • Proofs of space: When space is of the essence. Cryptology ePrint Archive
    • Ateniese, G., Bonacina, I., Faonio, A., Galesi, N.: Proofs of space: When space is of the essence. Cryptology ePrint Archive, Report 2013/805 (2013), http://eprint.iacr.org/
    • (2013) Report 2013/805
    • Ateniese, G.1    Bonacina, I.2    Faonio, A.3    Galesi, N.4
  • 4
    • 77956997411 scopus 로고    scopus 로고
    • Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • De, A., Trevisan, L., Tulsiani, M.: Time Space Tradeoffs for Attacks against One-Way Functions and PRGs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 649-665. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 649-665
    • De, A.1    Trevisan, L.2    Tulsiani, M.3
  • 5
    • 84943235829 scopus 로고
    • Pricing via Processing or Combatting Junk Mail
    • In: Brickell, E.F. (ed.), Springer, Heidelberg
    • Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
    • (1993) CRYPTO 1992. LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 7
    • 79953231613 scopus 로고    scopus 로고
    • One-Time Computable Self-erasing Functions
    • In: Ishai, Y. (ed.), Springer, Heidelberg
    • Dziembowski, S., Kazana, T., Wichs, D.: One-Time Computable Self-erasing Functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 125-143. Springer, Heidelberg (2011)
    • (2011) TCC 2011. LNCS , vol.6597 , pp. 125-143
    • Dziembowski, S.1    Kazana, T.2    Wichs, D.3
  • 8
    • 0033294770 scopus 로고    scopus 로고
    • Rigorous time/space trade-offs for inverting functions
    • Fiat, A., Naor, M.: Rigorous time/space trade-offs for inverting functions. SIAM J. Comput. 29(3), 790-803 (1999)
    • (1999) SIAM J. Comput , vol.29 , Issue.3 , pp. 790-803
    • Fiat, A.1    Naor, M.2
  • 9
    • 0019038335 scopus 로고
    • A cryptanalytic time-memory trade-off
    • Martin, E.: A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory 26(4), 401-406 (1980)
    • (1980) IEEE Transactions on Information Theory , vol.26 , Issue.4 , pp. 401-406
    • Martin, E.1
  • 10
    • 0016047180 scopus 로고
    • Computing partitions with applications to the knapsack problem
    • Horowitz, E., Sahni, S.: Computing partitions with applications to the knapsack problem. J. ACM 21(2), 277-292 (1974)
    • (1974) J. ACM , vol.21 , Issue.2 , pp. 277-292
    • Horowitz, E.1    Sahni, S.2
  • 11
    • 84927635141 scopus 로고    scopus 로고
    • New wine into old wineskins: A survey of some pebbling classics with supplemental results
    • Nordstrom, J.: New wine into old wineskins: A survey of some pebbling classics with supplemental results (2011)
    • (2011)
    • Nordstrom, J.1
  • 12
    • 84943730406 scopus 로고
    • Space bounds for a game of graphs
    • Chandra, A.K., Wotschke, D., Friedman, E.P., Harrison, M.A. (eds.)
    • Paul, W.J., Tarjan, R.E., Celoni, J.R.: Space bounds for a game of graphs. In: Chandra, A.K., Wotschke, D., Friedman, E.P., Harrison, M.A. (eds.) STOC, pp. 149-160. ACM (1976)
    • (1976) STOC , pp. 149-160
    • Paul, W.J.1    Tarjan, R.E.2    Celoni, J.R.3
  • 13
    • 78049363496 scopus 로고    scopus 로고
    • Secure Code Update for Embedded Devices via Proofs of Secure Erasure
    • In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.), Springer, Heidelberg
    • Perito, D., Tsudik, G.: Secure Code Update for Embedded Devices via Proofs of Secure Erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643-662. Springer, Heidelberg (2010)
    • (2010) ESORICS 2010. LNCS, , vol.6345 , pp. 643-662
    • Perito, D.1    Tsudik, G.2
  • 14
    • 84927614192 scopus 로고    scopus 로고
    • Near-linear time, leakage-resilient key evolution schemes from expander graphs. Cryptology ePrint Archive
    • Smith, A., Zhang, Y.: Near-linear time, leakage-resilient key evolution schemes from expander graphs. Cryptology ePrint Archive, Report 2013/864 (2013), http://eprint.iacr.org/
    • (2013) Report 2013/864
    • Smith, A.1    Zhang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.