2019
DOI: 10.1007/978-3-030-26951-7_19
|View full text |Cite
|
Sign up to set email alerts
|

Memory-Hard Functions from Cryptographic Primitives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
25
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(26 citation statements)
references
References 17 publications
1
25
0
Order By: Relevance
“…The main contribution is a reduction to the energy complexity of the constructed function from the red-blue pebbling complexity of the underlying depth-robust graph. The results extend the theory developed by Chen and Tessaro [13] who established an analogous relation for the cumulative memory complexity [7] of a random permutation based memory-hard function and the black pebbling complexity of the underlying graph.…”
Section: Our Contributionssupporting
confidence: 83%
See 3 more Smart Citations
“…The main contribution is a reduction to the energy complexity of the constructed function from the red-blue pebbling complexity of the underlying depth-robust graph. The results extend the theory developed by Chen and Tessaro [13] who established an analogous relation for the cumulative memory complexity [7] of a random permutation based memory-hard function and the black pebbling complexity of the underlying graph.…”
Section: Our Contributionssupporting
confidence: 83%
“…We note that the construction of a random permutation based bandwidth-hard function could be dug out from two previous works. One can use the technique of [13] to first prove memory-hardness and then apply a result from [11]. The later work showed a lower bound of energy cost by the square root of the memory-cost.…”
Section: Impact Of Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…To prevent 51% attacks, PoW should minimize the difference of computational advantage between dedicated hardware (ASIC) and ordinary CPUs as possible. A solution for this purpose is a memory-hard function that consumes a large number of memory accesses [2]- [4].…”
Section: Introductionmentioning
confidence: 99%