Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, require the use of a certain amount of resources to be solved, hence introducing a cost that is often regarded as a time delay---though it could involve other metrics as well, such as bandwidth. These powerful features have made puzzles the core of many security protocols, acquiring increasing importance in the IT security landscape. The concept of a puzzle has subsequently been extended to other types of schemes that do not use cryptographic functions, such as CAPTCHAs, which are used to discriminate humans from...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
A \captcha is a puzzle that is easy for humans but hard to solve for computers. A formal framework, ...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on e...
Abstract. Cryptographic puzzles are moderately difficult problems that can be solved by investing no...
Abstract: Cryptographic puzzles provide an elegant solution in combating denial of services attacks....
Abstract. Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be so...
Cryptographic puzzles are promising techniques for mitigating DDoS attacks via decreasing the incomi...
Availability has become a primary goal of information security and is as significant as other goals,...
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a ...
Abstract—Spam and Denial-of-Service (DoS) attacks are growing threats on the Internet. Cryptographic...
We introduce a formal quantitative notion of ``bit security\u27\u27 for a general type of cryptograp...
Client puzzles are computable cryptographic problems used to defend against connection depletion att...
Cryptographic client puzzles have been widely proposed for mitigating the rising denial-of-service (...
The paper concerns an important but underappreciated genre of algorithmic puzzles, explaining what t...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
A \captcha is a puzzle that is easy for humans but hard to solve for computers. A formal framework, ...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on e...
Abstract. Cryptographic puzzles are moderately difficult problems that can be solved by investing no...
Abstract: Cryptographic puzzles provide an elegant solution in combating denial of services attacks....
Abstract. Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be so...
Cryptographic puzzles are promising techniques for mitigating DDoS attacks via decreasing the incomi...
Availability has become a primary goal of information security and is as significant as other goals,...
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a ...
Abstract—Spam and Denial-of-Service (DoS) attacks are growing threats on the Internet. Cryptographic...
We introduce a formal quantitative notion of ``bit security\u27\u27 for a general type of cryptograp...
Client puzzles are computable cryptographic problems used to defend against connection depletion att...
Cryptographic client puzzles have been widely proposed for mitigating the rising denial-of-service (...
The paper concerns an important but underappreciated genre of algorithmic puzzles, explaining what t...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
A \captcha is a puzzle that is easy for humans but hard to solve for computers. A formal framework, ...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...