-
5
-
-
0024714327
-
Time/space trade-offs for reversible computation
-
Charles H. Bennett. Time/space trade-offs for reversible computation. SIAM J. Comput., 18(4):766-776, 1989.
-
(1989)
SIAM J. Comput
, vol.18
, Issue.4
, pp. 766-776
-
-
Bennett, C.H.1
-
7
-
-
84976813455
-
Efficient compilation of linear recursive programs
-
IEEE Computer Society
-
Ashok K. Chandra. Efficient compilation of linear recursive programs. In SWAT (FOCS), pages 16-25. IEEE Computer Society, 1973.
-
(1973)
SWAT (FOCS)
, pp. 16-25
-
-
Chandra, A.K.1
-
10
-
-
85034251994
-
Cook. An observation on time-storage trade off
-
New York, NY, USA, ACM
-
Stephen A. Cook. An observation on time-storage trade off. In Proceedings of the Fifth Annual ACM Symposium on Theory of Computing, STOC '73, pages 29-33, New York, NY, USA, 1973. ACM.
-
(1973)
Proceedings of the Fifth Annual ACM Symposium on Theory of Computing, STOC '73
, pp. 29-33
-
-
Stephen, A.1
-
12
-
-
35248835679
-
On memory-bound functions for fighting spam
-
Springer
-
Cynthia Dwork, Andrew Goldberg, and Moni Naor. On memory-bound functions for fighting spam. In Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, volume 2729 of Lecture Notes in Computer Science, pages 426-444. Springer, 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, Volume 2729 of Lecture Notes in Computer Science
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
13
-
-
79953231613
-
One-time computable self-erasing functions
-
Yuval Ishai, editor, Springer
-
Stefan Dziembowski, Tomasz Kazana, and Daniel Wichs. One-time computable self-erasing functions. In Yuval Ishai, editor, TCC, volume 6597 of Lecture Notes in Computer Science, pages 125-143. Springer, 2011.
-
(2011)
TCC, Volume 6597 of Lecture Notes in Computer Science
, pp. 125-143
-
-
Dziembowski, S.1
Kazana, T.2
Wichs, D.3
-
14
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
London, UK, UK, Springer-Verlag
-
Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '92, pages 139-147, London, UK, UK, 1993. Springer-Verlag.
-
(1993)
Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
15
-
-
33745136796
-
Pebbling and proofs of work
-
Springer
-
Cynthia Dwork, Moni Naor, and Hoeteck Wee. Pebbling and proofs of work. In Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of Lecture Notes in Computer Science, pages 37-54. Springer, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, Volume 3621 of Lecture Notes in Computer Science
, pp. 37-54
-
-
Dwork, C.1
Naor, M.2
Wee, H.3
-
16
-
-
0020732243
-
Speedups of deterministic machines by synchronous parallel machines
-
Patrick W. Dymond and Martin Tompa. Speedups of deterministic machines by synchronous parallel machines. J. Comput. Syst. Sci., 30(2):149-161, 1985.
-
(1985)
J. Comput. Syst. Sci
, vol.30
, Issue.2
, pp. 149-161
-
-
Dymond, P.W.1
Tompa, M.2
-
17
-
-
84875154516
-
-
Technical report, Stanford, CA, USA
-
Paul Erdoes, Ronald L. Graham, and Endre Szemeredi. On sparse graphs with dense long paths. Technical report, Stanford, CA, USA, 1975.
-
(1975)
On Sparse Graphs with Dense Long Paths
-
-
Erdoes, P.1
Graham, R.L.2
Szemeredi, E.3
-
19
-
-
0032265905
-
Auditable metering with lightweight security
-
Matthew K. Franklin and Dahlia Malkhi. Auditable metering with lightweight security. Journal of Computer Security, 6(4):237-256, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.4
, pp. 237-256
-
-
Franklin, M.K.1
Malkhi, D.2
-
20
-
-
0004039472
-
-
Electronic Frontier Foundation, O'Reilly & Associates, Inc., Sebastopol, CA, USA
-
Electronic Frontier Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. O'Reilly & Associates, Inc., Sebastopol, CA, USA, 1998.
-
(1998)
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
-
-
-
21
-
-
84905364011
-
Password Cracking HPC
-
Presented at, Norway
-
Jeremi Gosney. Password Cracking HPC. Presented at Password12 in Oslo, Norway, 2012.
-
(2012)
Password12 in Oslo
-
-
Gosney, J.1
-
22
-
-
0002408060
-
-
ACM, New York, NY, USA
-
Carl E. Hewitt and Michael S. Paterson. Record of the project mac conference on concurrent systems and parallel computation. chapter Comparative Schematology, pages 119-127. ACM, New York, NY, USA, 1970.
-
(1970)
Record of the Project Mac Conference on Concurrent Systems and Parallel Computation. Chapter Comparative Schematology
, pp. 119-127
-
-
Hewitt, C.E.1
Paterson, M.S.2
-
23
-
-
0004085539
-
On time versus space
-
April
-
John Hopcroft, Wolfgang Paul, and Leslie Valiant. On time versus space. J. ACM, 24(2):332-337, April 1977.
-
(1977)
J. ACM
, vol.24
, Issue.2
, pp. 332-337
-
-
Hopcroft, J.1
Paul, W.2
Valiant, L.3
-
24
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
San Diego, California, USA. The Internet Society
-
Ari Juels and John G. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA. The Internet Society, 1999.
-
(1999)
Proceedings of the Network and Distributed System Security Symposium, NDSS 1999
-
-
Juels, A.1
Brainard, J.G.2
-
25
-
-
14844286782
-
Proofs of work and bread pudding protocols
-
Deventer, The Netherlands, The Netherlands, Kluwer, B.V
-
Markus Jakobsson and Ari Juels. Proofs of work and bread pudding protocols. In Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security, CMS '99, pages 258-272, Deventer, The Netherlands, The Netherlands, 1999. Kluwer, B.V.
-
(1999)
Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security, CMS '99
, pp. 258-272
-
-
Jakobsson, M.1
Juels, A.2
-
26
-
-
80455162541
-
Non-parallelizable and non-interactive client puzzles from modular square roots
-
IEEE
-
Yves Igor Jerschow and Martin Mauve. Non-parallelizable and non-interactive client puzzles from modular square roots. In ARES, pages 135-142. IEEE, 2011.
-
(2011)
ARES
, pp. 135-142
-
-
Jerschow, Y.I.1
Mauve, M.2
-
27
-
-
78049359365
-
Low-cost client puzzles based on modular exponentiation
-
Berlin, Heidelberg, Springer-Verlag
-
Ghassan O. Karame and Srdjan Cəpkun. Low-cost client puzzles based on modular exponentiation. In Proceedings of the 15th European Conference on Research in Computer Security, ESORICS'10, pages 679-697, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 15th European Conference on Research in Computer Security, ESORICS'10
, pp. 679-697
-
-
Karame, G.O.1
Cəpkun, S.2
-
28
-
-
84976818810
-
Asymptotically tight bounds on time-space trade-offs in a pebble game
-
October
-
Thomas Lengauer and Robert E. Tarjan. Asymptotically tight bounds on time-space trade-offs in a pebble game. J. ACM, 29(4):1087-1130, October 1982.
-
(1982)
J. ACM
, vol.29
, Issue.4
, pp. 1087-1130
-
-
Lengauer, T.1
Tarjan, R.E.2
-
30
-
-
80052007221
-
Time-lock puzzles in the random oracle model
-
In Phillip Rogaway, editor, Springer
-
Mohammad Mahmoody, Tal Moran, and Salil P. Vadhan. Time-lock puzzles in the random oracle model. In Phillip Rogaway, editor, CRYPTO, volume 6841 of Lecture Notes in Computer Science, pages 39-50. Springer, 2011.
-
(2011)
CRYPTO, Volume 6841 of Lecture Notes in Computer Science
, pp. 39-50
-
-
Mahmoody, M.1
Moran, T.2
Vadhan, S.P.3
-
31
-
-
84873385121
-
Publicly verifiable proofs of sequential work
-
New York, NY, USA, ACM
-
Mohammad Mahmoody, Tal Moran, and Salil Vadhan. Publicly verifiable proofs of sequential work. In Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS '13, pages 373-388, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS '13
, pp. 373-388
-
-
Mahmoody, M.1
Moran, T.2
Vadhan, S.3
-
35
-
-
84255181603
-
Stronger key derivation via sequential memory-hard functions
-
C. Percival. Stronger key derivation via sequential memory-hard functions. In BSDCan 2009, 2009.
-
(2009)
BSDCan
-
-
Percival, C.1
-
36
-
-
0001381109
-
Superconcentrators
-
Nicholas Pippenger. Superconcentrators. SIAM J. Comput., 6(2):298-304, 1977.
-
(1977)
SIAM J. Comput
, vol.6
, Issue.2
, pp. 298-304
-
-
Pippenger, N.1
-
37
-
-
84913363992
-
Comparative schematology and pebbling with auxiliary pushdowns (preliminary version)
-
New York, NY, USA, ACM
-
Nicholas Pippenger. Comparative schematology and pebbling with auxiliary pushdowns (preliminary version). In Proceedings of the Twelfth Annual ACM Symposium on Theory of Computing, STOC '80, pages 351-356, New York, NY, USA, 1980. ACM.
-
(1980)
Proceedings of the Twelfth Annual ACM Symposium on Theory of Computing, STOC '80
, pp. 351-356
-
-
Pippenger, N.1
-
38
-
-
84943730406
-
Space bounds for a game on graphs
-
New York, NY, USA, ACM
-
Wolfgang J. Paul, Robert Endre Tarjan, and James R. Celoni. Space bounds for a game on graphs. In Proceedings of the Eighth Annual ACM Symposium on Theory of Computing, STOC '76, pages 149-160, New York, NY, USA, 1976. ACM.
-
(1976)
Proceedings of the Eighth Annual ACM Symposium on Theory of Computing, STOC '76
, pp. 149-160
-
-
Paul, W.J.1
Tarjan, R.E.2
Celoni, J.R.3
-
39
-
-
0000965494
-
Separation of the monotone nc hierarchy
-
Ran Raz and Pierre McKenzie. Separation of the monotone nc hierarchy. Combinatorica, 19(3):403-435, 1999.
-
(1999)
Combinatorica
, vol.19
, Issue.3
, pp. 403-435
-
-
Raz, R.1
McKenzie, P.2
-
40
-
-
0010602889
-
-
Cambridge, MA, USA
-
R. L. Rivest, A. Shamir, and D. A. Wagner. Time-lock puzzles and timed-release crypto. Technical report, Cambridge, MA, USA, 1996.
-
(1996)
Time-lock Puzzles and Timed-release Crypto. Technical Report
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
41
-
-
84976758719
-
Ruzzo. Tree-size bounded alternation(extended abstract)
-
New York, NY, USA, ACM
-
Walter L. Ruzzo. Tree-size bounded alternation(extended abstract). In Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing, STOC '79, pages 352-359, New York, NY, USA, 1979. ACM.
-
(1979)
Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing, STOC '79
, pp. 352-359
-
-
Walter, L.1
-
42
-
-
0020890382
-
On depth-reduction and grates
-
IEEE Computer Society
-
Georg Schnitger. On depth-reduction and grates. In FOCS, pages 323-328. IEEE Computer Society, 1983.
-
(1983)
FOCS
, pp. 323-328
-
-
Schnitger, G.1
-
43
-
-
0000180398
-
Complete register allocation problems
-
Ravi Sethi. Complete register allocation problems. SIAM J. Comput., 4(3):226-248, 1975.
-
(1975)
SIAM J. Comput
, vol.4
, Issue.3
, pp. 226-248
-
-
Sethi, R.1
-
45
-
-
84915912055
-
Space-time tradeoffs for oblivious interger multiplications
-
Springer
-
John E. Savage and Sowmitri Swamy. Space-time tradeoffs for oblivious interger multiplications. In Hermann A. Maurer, editor, ICALP, volume 71 of Lecture Notes in Computer Science, pages 498-504. Springer, 1979.
-
(1979)
Hermann A. Maurer, Editor, ICALP, Volume 71 of Lecture Notes in Computer Science
, pp. 498-504
-
-
Savage, J.E.1
Swamy, S.2
-
46
-
-
0018310117
-
Space-time tradeoffs for linear recursion
-
Alfred V. Aho, Stephen N. Zilles, and Barry K. Rosen, editors, ACM Press
-
Sowmitri Swamy and John E. Savage. Space-time tradeoffs for linear recursion. In Alfred V. Aho, Stephen N. Zilles, and Barry K. Rosen, editors, POPL, pages 135-142. ACM Press, 1979.
-
(1979)
POPL
, pp. 135-142
-
-
Swamy, S.1
Savage, J.E.2
-
47
-
-
38349080863
-
Toward non-parallelizable client puzzles
-
Suratose Tritilanunt, Colin A. Boyd, Ernest Foo, and Juan M. Gonzalez Nieto. Toward non-parallelizable client puzzles. Cryptology and Network Security (LNCS), 4856:247-264, 2007.
-
(2007)
Cryptology and Network Security (LNCS)
, vol.4856
, pp. 247-264
-
-
Tritilanunt, S.1
Boyd, C.A.2
Foo, E.3
Nieto Gonzalez, J.M.4
-
48
-
-
85034258456
-
Area-time complexity for VLSI
-
New York, NY, USA, ACM
-
C. D. Thompson. Area-time complexity for vlsi. In Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing, STOC '79, pages 81-88, New York, NY, USA, 1979. ACM.
-
(1979)
Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing, STOC '79
, pp. 81-88
-
-
Thompson, C.D.1
-
49
-
-
0018052203
-
Time-space tradeoffs for computing functions, using connectivity properties of their circuits
-
New York, NY, USA. ACM
-
Martin Tompa. Time-space tradeoffs for computing functions, using connectivity properties of their circuits. In Proceedings of the Tenth Annual ACM Symposium on Theory of Computing, STOC '78, pages 196-204, New York, NY, USA, 1978. ACM.
-
(1978)
Proceedings of the Tenth Annual ACM Symposium on Theory of Computing, STOC '78
, pp. 196-204
-
-
Tompa, M.1
-
50
-
-
85016972944
-
Graph-theoretic arguments in low-level complexity
-
In Jozef Gruska, editor, Springer
-
Leslie G. Valiant. Graph-theoretic arguments in low-level complexity. In Jozef Gruska, editor, MFCS, volume 53 of Lecture Notes in Computer Science, pages 162-176. Springer, 1977.
-
(1977)
MFCS, Volume 53 of Lecture Notes in Computer Science
, pp. 162-176
-
-
Valiant, L.G.1
-
51
-
-
0024681761
-
A new pebble game that characterizes parallel complexity classes
-
H. Venkateswaran and Martin Tompa. A new pebble game that characterizes parallel complexity classes. SIAM J. Comput., 18(3):533-549, 1989.
-
(1989)
SIAM J. Comput
, vol.18
, Issue.3
, pp. 533-549
-
-
Venkateswaran, H.1
Tompa, M.2
|