Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
We describe and analyze a family of moderately hard, memory-bound functions, and we explain how to use them for protecting against abuses.
We describe and analyze a family of moderately hard, memory-bound functions, and we explain how to use them for protecting against abuses. 1. Introduction. With ...
We describe and analyze a family of moderately hard, memory-bound functions, and we explain how to use them for protecting against abuses. Categories and ...
For this purpose, we rely on memory-bound computations. We describe and analyze a family of moderately hard, memory-bound functions, and we explain how to use ...
May 1, 2005 · For this purpose, we rely on memory-bound computations. We describe and analyze a family of moderately hard, memory-bound functions, and we ...
In particular, the memorybound Proof-of-Work, also known as egalitarian Proof-of-Work, relies on random access to slow memory rather than computational hashing ...
Moderately Hard, Memory-Bound Functions ; Author(s): Martin Abadi , Michael Burrows, Ted Wobber ; Download: Paper (PDF) ; Date: 6 Feb 2003 ; Document Type: Reports.
Moderately hard, memory-bound functions. Martín Abadi. Michael M. Burrows. Mark Manasse. Ted Wobber. ACM Transactions on Internet Technology, 5 (2005), pp.
People also ask
Sep 27, 2017 · Several cryptographic schemes and applications are based on functions that are both reasonably efficient to compute and moderately hard to invert.
This talk describes a family of moderately hard, memory-bound functions, and explains how to use them for protecting against abuses. The talk also includes ...