-
1
-
-
21644461880
-
Moderately hard, memorybound functions
-
Abadi, M., Burrows, M., Manasse, M., Wobber, T.: Moderately hard, memorybound functions. ACM Trans. Internet Technol. 5(2), 299-327 (2005)
-
(2005)
ACM Trans. Internet Technol
, vol.5
, Issue.2
, pp. 299-327
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
2
-
-
77950803546
-
A guided tour puzzle for denial of service prevention
-
IEEE Computer Society
-
Abliz, M., Znati, T.: A guided tour puzzle for denial of service prevention. In: ACSAC, pp. 279-288. IEEE Computer Society (2009)
-
(2009)
ACSAC,
, pp. 279-288
-
-
Abliz, M.1
Znati, T.2
-
3
-
-
84927671041
-
Proofs of space: When space is of the essence. Cryptology ePrint Archive
-
Ateniese, G., Bonacina, I., Faonio, A., Galesi, N.: Proofs of space: When space is of the essence. Cryptology ePrint Archive, Report 2013/805 (2013), http://eprint.iacr.org/
-
(2013)
Report 2013/805
-
-
Ateniese, G.1
Bonacina, I.2
Faonio, A.3
Galesi, N.4
-
4
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM, New York
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 598-609. ACM, New York (2007)
-
(2007)
Proceedings of the 14Th ACM Conference on Computer and Communications Security, CCS 2007
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
5
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
In: Matsui, M. (ed.), Springer, Heidelberg
-
Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
6
-
-
14844310899
-
Hashcash-a denial of service counter-measure
-
Back, A.: Hashcash-a denial of service counter-measure. Technical report (2002)
-
(2002)
Technical Report
-
-
Back, A.1
-
8
-
-
0023646410
-
Does co-np have short interactive proofs? Inf. Process
-
Boppana, R.B., Hastad, J., Zachos, S.: Does co-np have short interactive proofs? Inf. Process. Lett. 25(2), 127-132 (1987)
-
(1987)
Lett
, vol.25
, Issue.2
, pp. 127-132
-
-
Boppana, R.B.1
Hastad, J.2
Zachos, S.3
-
9
-
-
84927663239
-
-
(eds.), Springer, Heidelberg
-
Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.): ICALP 2005. LNCS, vol. 3580. Springer, Heidelberg (2005)
-
(2005)
ICALP 2005. LNCS
, vol.3580
-
-
Caires, L.1
Italiano, G.F.2
Monteiro, L.3
Palamidessi, C.4
Yung, M.5
-
10
-
-
84874940192
-
Refereed delegation of computation
-
Canetti, R., Riva, B., Rothblum, G.N.: Refereed delegation of computation. Information and Computation 226, 16-36 (2013)
-
(2013)
Information and Computation
, vol.226
, pp. 16-36
-
-
Canetti, R.1
Riva, B.2
Rothblum, G.N.3
-
11
-
-
77957002840
-
Improved Delegation of Computation Using Fully Homomorphic Encryption
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Chung, K.-M., Kalai, Y., Vadhan, S.: Improved Delegation of Computation Using Fully Homomorphic Encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
12
-
-
35248835679
-
On memory-bound functions for fighting spam
-
In: Boneh, D. (ed.), Springer, Heidelberg
-
Dwork, C., Goldberg, A.V., Naor, M.: On memory-bound functions for fighting spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426-444. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.V.2
Naor, M.3
-
13
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
In: Brickell, E.F. (ed.), Springer, Heidelberg
-
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992. LNCS
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
14
-
-
33745136796
-
Pebbling and proofs of work
-
In: Shoup, V. (ed.), Springer, Heidelberg
-
Dwork, C., Naor, M., Wee, H.: Pebbling and proofs of work. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 37-54. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 37-54
-
-
Dwork, C.1
Naor, M.2
Wee, H.3
-
15
-
-
84927624537
-
Proofs of space. Cryptology ePrint Archive
-
Dziembowski, S., Faust, S., Kolmogorov, V., Pietrzak, K.: Proofs of space. Cryptology ePrint Archive, Report 2013/796 (2013), http://eprint.iacr.org/
-
(2013)
Report 2013/796
-
-
Dziembowski, S.1
Faust, S.2
Kolmogorov, V.3
Pietrzak, K.4
-
16
-
-
80051978069
-
Key-evolution schemes resilient to spacebounded leakage
-
In: Rogaway, P. (ed.), Springer, Heidelberg
-
Dziembowski, S., Kazana, T., Wichs, D.: Key-evolution schemes resilient to spacebounded leakage. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 335-353. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 335-353
-
-
Dziembowski, S.1
Kazana, T.2
Wichs, D.3
-
17
-
-
79953231613
-
One-time computable self-erasing functions
-
In: Ishai, Y. (ed.), Springer, Heidelberg
-
Dziembowski, S., Kazana, T., Wichs, D.: One-time computable self-erasing functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 125-143. Springer, Heidelberg (2011)
-
(2011)
TCC 2011. LNCS
, vol.6597
, pp. 125-143
-
-
Dziembowski, S.1
Kazana, T.2
Wichs, D.3
-
18
-
-
84927594927
-
Proofs of space and a greener bitcoin. Talk presented at Workshop on Leakage, Tampering and Viruses
-
Dziembowski, S., Pietrzak, K., Faust, S.: Proofs of space and a greener bitcoin. Talk presented at Workshop on Leakage, Tampering and Viruses, Warsaw 2013 (2013)
-
(2013)
Warsaw
, pp. 2013
-
-
Dziembowski, S.1
Pietrzak, K.2
Faust, S.3
-
19
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, p. 501 (2012)
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012
, pp. 501
-
-
Fiore, D.1
Gennaro, R.2
-
20
-
-
0344794411
-
On the complexity of interactive proofs with bounded communication
-
Goldreich, O., Hastad, J.: On the complexity of interactive proofs with bounded communication. Information Processing Letters (1998)
-
(1998)
Information Processing Letters
-
-
Goldreich, O.1
Hastad, J.2
-
21
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
ACM, New York
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC 2008, pp. 113-122. ACM, New York (2008)
-
(2008)
Proceedings of the 40Th Annual ACM Symposium on Theory of Computing, STOC 2008
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
22
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
Juels, A., Brainard, J.G.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: NDSS. The Internet Society (1999)
-
(1999)
NDSS. The Internet Society
-
-
Juels, A.1
Brainard, J.G.2
-
23
-
-
84927615559
-
Efficient Proofs of Secure Erasure
-
In: Abdalla, M., De Prisco, R. (eds.), Springer, Heidelberg
-
Karvelas, N.P., Kiayias, A.: Efficient Proofs of Secure Erasure. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 526-543. Springer, Heidelberg (2014)
-
(2014)
SCN 2014. LNCS
, vol.8642
, pp. 526-543
-
-
Karvelas, N.P.1
Kiayias, A.2
-
25
-
-
84976818810
-
Asymptotically tight bounds on time-space trade-offs in a pebble game
-
Lengauer, T., Tarjan, R.E.: Asymptotically tight bounds on time-space trade-offs in a pebble game. Journal of the ACM (JACM) 29(4), 1087-1130 (1982)
-
(1982)
Journal of the ACM (JACM)
, vol.29
, Issue.4
, pp. 1087-1130
-
-
Lengauer, T.1
Tarjan, R.E.2
-
26
-
-
0034854953
-
Computationally sound proofs
-
Micali, S.: Computationally sound proofs. SIAM Journal on Computing 30(4), 1253-1298 (2000)
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
27
-
-
84927638086
-
-
Bitcoin: A peer-to-peer electronic cash system, May
-
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (May 2009)
-
(2009)
-
-
Nakamoto, S.1
-
28
-
-
84868349605
-
Stronger key derivation via sequential memory-hard functions
-
Percival, C.: Stronger key derivation via sequential memory-hard functions. Presented at BSDCan 2009 (2009)
-
(2009)
Presented at Bsdcan
, pp. 2009
-
-
Percival, C.1
-
29
-
-
78049363496
-
Secure code update for embedded devices via proofs of secure erasure
-
In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.), Springer, Heidelberg
-
Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643-662. Springer, Heidelberg (2010)
-
(2010)
ESORICS 2010. LNCS,
, vol.6345
, pp. 643-662
-
-
Perito, D.1
Tsudik, G.2
-
30
-
-
0001381109
-
Superconcentrators. SIAM
-
Pippenger, N.: Superconcentrators. SIAM J. Comput. 6(2), 298-304 (1977)
-
(1977)
J. Comput
, vol.6
, Issue.2
, pp. 298-304
-
-
Pippenger, N.1
-
31
-
-
58349118819
-
Compact proofs of retrievability
-
In: Pieprzyk, J. (ed.), Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008. LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
32
-
-
84927614192
-
Near-linear time, leakage-resilient key evolution schemes from expander graphs
-
Smith, A., Zhang, Y.: Near-linear time, leakage-resilient key evolution schemes from expander graphs. IACR Cryptology ePrint Archive, 2013:864 (2013)
-
(2013)
IACR Cryptology Eprint Archive
, vol.2013
, pp. 864
-
-
Smith, A.1
Zhang, Y.2
-
33
-
-
0018052203
-
Time-space tradeoffs for computing functions, using connectivity properties of their circuits
-
ACM, New York
-
Tompa, M.: Time-space tradeoffs for computing functions, using connectivity properties of their circuits. In: Proceedings of the Tenth Annual ACM Symposium on Theory of Computing, STOC 1978, pp. 196-204. ACM, New York (1978)
-
(1978)
Proceedings of the Tenth Annual ACM Symposium on Theory of Computing, STOC 1978
, pp. 196-204
-
-
Tompa, M.1
-
34
-
-
14844300104
-
New client puzzle outsourcing techniques for dos resistance
-
ACM, New York
-
Waters, B., Juels, A., Alex Halderman, J., Felten, E.W.: New client puzzle outsourcing techniques for dos resistance. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 246-256. ACM, New York (2004)
-
(2004)
Proceedings of the 11Th ACM Conference on Computer and Communications Security, CCS 2004
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Alex Halderman, J.3
Felten, E.W.4
|