scientific article; zbMATH DE number 708802

From MaRDI portal
Publication:4318690

zbMath0925.94094MaRDI QIDQ4318690

Moni Naor, Cynthia Dwork

Publication date: 29 August 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Security definitions on time-lock puzzlesMagnifying computing gaps. Establishing encrypted communication over unidirectional channelsFine-grained secure computationImproved Cryptographic Puzzle Based on Modular ExponentiationA note on the Dwork-Naor timed deniable authenticationProof of Space from Stacked ExpandersSoK: securing email -- a stakeholder-based analysisDesigning Proof of Human-Work Puzzles for Cryptocurrency and BeyondFiat-Shamir and correlation intractability from strong KDM-secure encryptionResource allocation for restoration of compromised systemsNetwork-formation games with regular objectivesWho are you? Secure identities in single hop ad hoc networksProofs of Work from worst-case assumptionsSoft power: upgrading chain macroeconomic policy through soft forksSoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrenciesQuery-Complexity Amplification for Random OraclesResource Burning for Permissionless Systems (Invited Paper)Permissionless consensus in the resource modelAn incremental PoSW for general weight distributionsVerifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting)Indistinguishable Proofs of Work or KnowledgeAlgorand: a secure and efficient distributed ledgerAn (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle TreesBalloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential AttacksMemory-hard puzzles in the standard model with applications to memory-hard functions and resource-bounded locally decodable codesShort-lived zero-knowledge proofs and signaturesNon-interactive universal argumentsCompleteness theorems for adaptively secure broadcastTwo-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock PuzzlesBankrupting Sybil despite churnSecure computation without authenticationCompact Storage of Superblocks for NIPoPoW ApplicationsDEVELOPING SAFE PROTOCOL FOR DISTRIBUTED TASK-BASED CTF HOLDING SYSTEMUnnamed ItemHow to build time-lock encryptionCryptographic puzzles and DoS resilience, revisitedStronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsContinuous verifiable delay functionsGeneric-group delay functions require hidden-order groupsTowards Denial-of-Service-Resilient Key Agreement ProtocolsCorrectness of Tendermint-Core BlockchainsBlockchain and cryptocurrencies: economic and financial researchA resource-competitive jamming defenseCArrency: an energy-efficient proof-of-work scheme for crypto-currenciesTimed-Release Encryption RevisitedGenerically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functionsAnalysis of the Blockchain Protocol in Asynchronous NetworksScrypt Is Maximally Memory-Hard




This page was built for publication: