A memory-hard function (MHF) $f_n$ with parameter $n$ can be computed in sequential time and space $n$. Simultaneously, a high amortized parallel area-time complexity (aAT) is incurred per evaluation. In practice, MHFs are used to limit the rate at which an adversary (using a custom computational device) can evaluate a security sensitive function that still occasionally needs to be evaluated by honest users (using an off-the-shelf general purpose device). The most prevalent examples of such sensitive functions are Key Derivation Functions (KDFs) and password hashing algorithms where rate limits help mitigate off-line dictionary attacks. As the honest users\u27 inputs to these functions are often (low-entropy) passwords special attention is ...
peer reviewedWe explore time-memory and other tradeoffs for memory-hard functions, which are suppose...
International audienceThe main efficiency metrics for a cryptographic primitive are its speed, its c...
Cryptographic hash functions are efficiently computable functions that shrink a long input into a sh...
A memory-hard function (MHF) ƒn with parameter n can be computed in sequential time and space n. Sim...
Data-independent Memory Hard Functions (iMHFS) are finding a growing number of applications in secur...
Memory hard functions (MHFs) are an important cryptographic primitive that are used to design egalit...
Memory-hard functions (MHFs) is a class of hash functions whose fast evaluation requires the heavy u...
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the c...
Argon2i is a data-independent memory hard function that won the password hashing competition. The pa...
We present a new hash function Argon2, which is oriented at protection of low-entropy secrets withou...
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding t...
We develop new theoretical tools for proving lower-bounds on the (amortized) complexity of certain f...
Several cryptographic schemes and applications are based on functions that are both reasonably effic...
Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori ...
The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memor...
peer reviewedWe explore time-memory and other tradeoffs for memory-hard functions, which are suppose...
International audienceThe main efficiency metrics for a cryptographic primitive are its speed, its c...
Cryptographic hash functions are efficiently computable functions that shrink a long input into a sh...
A memory-hard function (MHF) ƒn with parameter n can be computed in sequential time and space n. Sim...
Data-independent Memory Hard Functions (iMHFS) are finding a growing number of applications in secur...
Memory hard functions (MHFs) are an important cryptographic primitive that are used to design egalit...
Memory-hard functions (MHFs) is a class of hash functions whose fast evaluation requires the heavy u...
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the c...
Argon2i is a data-independent memory hard function that won the password hashing competition. The pa...
We present a new hash function Argon2, which is oriented at protection of low-entropy secrets withou...
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding t...
We develop new theoretical tools for proving lower-bounds on the (amortized) complexity of certain f...
Several cryptographic schemes and applications are based on functions that are both reasonably effic...
Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori ...
The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memor...
peer reviewedWe explore time-memory and other tradeoffs for memory-hard functions, which are suppose...
International audienceThe main efficiency metrics for a cryptographic primitive are its speed, its c...
Cryptographic hash functions are efficiently computable functions that shrink a long input into a sh...