Data-independent memory hard functions: new attacks and stronger constructions
From MaRDI portal
Recommendations
- scientific article; zbMATH DE number 7650384
- Memory-hard functions from cryptographic primitives
- Tradeoff Cryptanalysis of Memory-Hard Functions
- Efficiently computing data-independent memory-hard functions
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- New attacks on Feistel structures with improved memory complexities
- Time-Memory Trade-Off Attacks on Multiplications and T-Functions
- scientific article; zbMATH DE number 1088242
- Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries
Cited in
(15)- Efficiently computing data-independent memory-hard functions
- Memory-hard functions from cryptographic primitives
- Tradeoff Cryptanalysis of Memory-Hard Functions
- Depth-robust graphs and their cumulative memory complexity
- On the computational complexity of minimal cumulative cost graph pebbling
- Static-memory-hard functions, and modeling the cost of space vs. time
- Bandwidth-Hard Functions: Reductions and Lower Bounds
- Sustained space complexity
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- Trapdoor memory-hard functions
- Study on massive-scale slow-hash recovery using unified probabilistic context-free grammar and symmetrical collaborative prioritization with parallel machines
- Memory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codes
- On the depth-robustness and cumulative pebbling cost of Argon2i
- The parallel reversible pebbling game: analyzing the post-quantum security of iMHFs
- Sustained space and cumulative complexity trade-offs for data-dependent memory-hard functions
This page was built for publication: Data-independent memory hard functions: new attacks and stronger constructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2304996)