One-time computable self-erasing functions
From MaRDI portal
Publication:3000536
DOI10.1007/978-3-642-19571-6_9zbMATH Open1295.94061OpenAlexW1569144247MaRDI QIDQ3000536FDOQ3000536
Daniel Wichs, Tomasz Kazana, Stefan Dziembowski
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_9
Recommendations
Cited In (14)
- One-Time Programs with Limited Memory
- Individual cryptography
- Formalizing data deletion in the context of the right to be forgotten
- Proofs of Space
- Proof of Space from Stacked Expanders
- Unclonable polymers and their cryptographic applications
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
- Bandwidth-Hard Functions: Reductions and Lower Bounds
- The cost of adaptivity in security games on graphs
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Non-malleable Codes with Split-State Refresh
- How to Protect Yourself without Perfect Shredding
- Static-memory-hard functions, and modeling the cost of space vs. time
- Depth-Robust Graphs and Their Cumulative Memory Complexity
This page was built for publication: One-time computable self-erasing functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000536)