On the Memory-Hardness of Data-Independent Password-Hashing Functions
暂无分享,去创建一个
Leonid Reyzin | Karen Klein | Krzysztof Pietrzak | Peter Gazi | Joël Alwen | Chethan Kamath | Michal Rolinek | Georg Osang | Michal Rybár
[1] Alex Biryukov,et al. Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] Sunoo Park,et al. Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling , 2018, IACR Cryptol. ePrint Arch..
[3] Jeremiah Blocki,et al. Sustained Space Complexity , 2017, IACR Cryptol. ePrint Arch..
[4] Joël Alwen,et al. High Parallel Complexity Graphs and Memory-Hard Functions , 2015, IACR Cryptol. ePrint Arch..
[5] Srinivas Devadas,et al. Bandwidth Hard Functions for ASIC Resistance , 2017, TCC.
[6] Guido Bertoni,et al. The Making of KECCAK , 2014, Cryptologia.
[7] Guido Bertoni,et al. On the Indifferentiability of the Sponge Construction , 2008, EUROCRYPT.
[8] Samson Zhou,et al. On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i , 2017, TCC.
[9] Jeremiah Blocki,et al. Efficiently Computing Data-Independent Memory-Hard Functions , 2016, CRYPTO.
[10] C. Thomborson,et al. Area-time complexity for VLSI , 1979, STOC.
[11] Stefan Lucks,et al. The Catena Password-Scrambling Framework , 2015 .
[12] Alex Biryukov,et al. Tradeoff Cryptanalysis of Memory-Hard Functions , 2015, ASIACRYPT.
[13] Paulo S. L. M. Barreto,et al. Lyra2: password hashing scheme with improved security against time-memory trade-offs. , 2017 .
[14] Colin Percival. STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS , 2009 .
[15] Donghoon Chang,et al. Rig: A simple, secure and flexible design for Password Hashing , 2015, IACR Cryptol. ePrint Arch..
[16] Jeremiah Blocki,et al. Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions , 2017, IACR Cryptol. ePrint Arch..
[17] Jeremiah Blocki,et al. Depth-Robust Graphs and Their Cumulative Memory Complexity , 2017, EUROCRYPT.
[18] Samson Zhou,et al. Bandwidth-Hard Functions: Reductions and Lower Bounds , 2018, IACR Cryptol. ePrint Arch..
[19] Jeremiah Blocki,et al. Towards Practical Attacks on Argon2i and Balloon Hashing , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[20] Dan Boneh,et al. Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks , 2016, ASIACRYPT.