One-time computable self-erasing functions
From MaRDI portal
Publication:3000536
Recommendations
Cited in
(15)- How to Protect Yourself without Perfect Shredding
- Depth-robust graphs and their cumulative memory complexity
- Formalizing data deletion in the context of the right to be forgotten
- Proof of space from stacked expanders
- Static-memory-hard functions, and modeling the cost of space vs. time
- Bandwidth-Hard Functions: Reductions and Lower Bounds
- Individual cryptography
- Non-malleable Codes with Split-State Refresh
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- The cost of adaptivity in security games on graphs
- Bounded tamper resilience: how to go beyond the algebraic barrier
- One-time programs with limited memory
- Proofs of space
- Memory erasability amplification
- Unclonable polymers and their cryptographic applications
This page was built for publication: One-time computable self-erasing functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000536)