Data-independent Memory Hard Functions (iMHFS) are finding a growing number of applications in security; especially in the domain of password hashing. An important property of a concrete iMHF is specified by fixing a directed acyclic graph (DAG) Gn on n nodes. The quality of that iMHF is then captured by the following two pebbling complexities of Gn: – The parallel cumulative pebbling complexity Π∥cc(Gn) must be as high as possible (to ensure that the amortized cost of computing the function on dedicated hardware is dominated by the cost of memory). – The sequential space-time pebbling complexity Πst(Gn) should be as close as possible to Π∥cc(Gn) (to ensure that using many cores in parallel and amortizing over many instances does not give m...
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding t...
Abstract. Motivated by growing importance of parallelism in modern computational systems, we introdu...
We propose constructing provable collision resistant hash functions from expander graphs in which fi...
Data-independent Memory Hard Functions (iMHFS) are finding a growing number of applications in secur...
A memory-hard function (MHF) ƒn with parameter n can be computed in sequential time and space n. Sim...
A memory-hard function (MHF) $f_n$ with parameter $n$ can be computed in sequential time and space $...
We develop new theoretical tools for proving lower-bounds on the (amortized) complexity of certain f...
Memory hard functions (MHFs) are an important cryptographic primitive that are used to design egalit...
Argon2i is a data-independent memory hard function that won the password hashing competition. The pa...
Memory-hard functions (MHFs) is a class of hash functions whose fast evaluation requires the heavy u...
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the c...
peer reviewedWe explore time-memory and other tradeoffs for memory-hard functions, which are suppose...
Abstract. We explore time-memory and other tradeoffs for memory-hard functions, which are sup-posed ...
In a recent work, Fan, Li, and Yang (STOC 2022) constructed a family of almost-universal hash functi...
peer reviewedWe present a new hash function Argon2, which is oriented at protection of low-entropy s...
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding t...
Abstract. Motivated by growing importance of parallelism in modern computational systems, we introdu...
We propose constructing provable collision resistant hash functions from expander graphs in which fi...
Data-independent Memory Hard Functions (iMHFS) are finding a growing number of applications in secur...
A memory-hard function (MHF) ƒn with parameter n can be computed in sequential time and space n. Sim...
A memory-hard function (MHF) $f_n$ with parameter $n$ can be computed in sequential time and space $...
We develop new theoretical tools for proving lower-bounds on the (amortized) complexity of certain f...
Memory hard functions (MHFs) are an important cryptographic primitive that are used to design egalit...
Argon2i is a data-independent memory hard function that won the password hashing competition. The pa...
Memory-hard functions (MHFs) is a class of hash functions whose fast evaluation requires the heavy u...
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the c...
peer reviewedWe explore time-memory and other tradeoffs for memory-hard functions, which are suppose...
Abstract. We explore time-memory and other tradeoffs for memory-hard functions, which are sup-posed ...
In a recent work, Fan, Li, and Yang (STOC 2022) constructed a family of almost-universal hash functi...
peer reviewedWe present a new hash function Argon2, which is oriented at protection of low-entropy s...
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding t...
Abstract. Motivated by growing importance of parallelism in modern computational systems, we introdu...
We propose constructing provable collision resistant hash functions from expander graphs in which fi...