Cryptographic reductions typically aim to be tight by transforming an adversary A into an algorithm that uses essentially the same resources as A. In this work we initiate the study of memory efficiency in reductions. We argue that the amount of working memory used (relative to the initial adversary) is a relevant parameter in reductions, and that reductions that are inefficient with memory will sometimes yield less meaningful security guarantees. We then point to several common techniques in reductions that are memory-inefficient and give a toolbox for reducing memory usage. We review common cryptographic assumptions and their sensitivity to memory usage. Finally, we prove an impossibility result showing that reductions between some assump...
A cryptanalytic time-memory tradeoff (TMTO) is a technique that aims to reduce the time needed to pe...
In 1980, Martin Hellman [1] introduced the concept of cryptanalytic time-memory tradeoffs, which all...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
Cryptographic reductions typically aim to be tight by transforming an adversary A into an algorithm ...
We study the memory-tightness of security reductions in public-key cryptography, focusing in particu...
The research in complexity theory, for a long time now, has been conscious of memory as a resource i...
peer reviewedWe explore time-memory and other tradeoffs for memory-hard functions, which are suppose...
Many searching problems allow time-memory tradeoffs. That is, if there are K possible solutions to s...
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding t...
This paper initiates the study of the provable security of authenticated encryption (AE) in the memo...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
Abstract. We explore time-memory and other tradeoffs for memory-hard functions, which are sup-posed ...
In 1980 Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cry...
Abstract. The existence of tight reductions in cryptographic security proofs is an important questio...
© Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod. Reductions be...
A cryptanalytic time-memory tradeoff (TMTO) is a technique that aims to reduce the time needed to pe...
In 1980, Martin Hellman [1] introduced the concept of cryptanalytic time-memory tradeoffs, which all...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
Cryptographic reductions typically aim to be tight by transforming an adversary A into an algorithm ...
We study the memory-tightness of security reductions in public-key cryptography, focusing in particu...
The research in complexity theory, for a long time now, has been conscious of memory as a resource i...
peer reviewedWe explore time-memory and other tradeoffs for memory-hard functions, which are suppose...
Many searching problems allow time-memory tradeoffs. That is, if there are K possible solutions to s...
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding t...
This paper initiates the study of the provable security of authenticated encryption (AE) in the memo...
Memory tightness of reductions in cryptography, in addition to the standard tightness related to adv...
Abstract. We explore time-memory and other tradeoffs for memory-hard functions, which are sup-posed ...
In 1980 Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cry...
Abstract. The existence of tight reductions in cryptographic security proofs is an important questio...
© Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod. Reductions be...
A cryptanalytic time-memory tradeoff (TMTO) is a technique that aims to reduce the time needed to pe...
In 1980, Martin Hellman [1] introduced the concept of cryptanalytic time-memory tradeoffs, which all...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...