Foundations, properties, and security applications of puzzles: A survey

IM Ali, M Caprolu, RD Pietro - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …

Publicly verifiable proofs of sequential work

M Mahmoody, T Moran, S Vadhan - … of the 4th conference on Innovations …, 2013 - dl.acm.org
We construct a publicly verifiable protocol for proving computational work based on collision-
resistant hash functions and a new plausible complexity assumption regarding the existence …

CommitCoin: Carbon Dating Commitments with Bitcoin: (Short Paper)

J Clark, A Essex - International conference on financial cryptography and …, 2012 - Springer
In the standard definition of a commitment scheme, the sender commits to a message and
immediately sends the commitment to the recipient interested in it. However the sender may …

High parallel complexity graphs and memory-hard functions

J Alwen, V Serbinenko - Proceedings of the forty-seventh annual ACM …, 2015 - dl.acm.org
We develop new theoretical tools for proving lower-bounds on the (amortized) complexity of
certain functions in models of parallel computation. We apply the tools to construct a class of …

[PDF][PDF] Internet denial of service attacks and defense mechanisms

M Abliz - University of Pittsburgh, Department of Computer …, 2011 - blog.oureducation.in
Availability is one of the three main components of computer security, along with
confidentiality and integrity. Denial of service (DoS) is a threat that potentially violates the …

Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols

D Stebila, L Kuppusamy, J Rangasamy, C Boyd… - Topics in Cryptology–CT …, 2011 - Springer
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by
requiring a client to solve some moderately hard problem before being granted access to a …

A guided tour puzzle for denial of service prevention

M Abliz, T Znati - 2009 Annual Computer Security Applications …, 2009 - ieeexplore.ieee.org
Various cryptographic puzzle schemes are proposed as a defense mechanism against
denial of service attack. But, all these puzzle schemes face a dilemma when there is a large …

A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks

M Darwish, A Ouda, LF Capretz - Journal of Information Security and …, 2015 - Elsevier
Cloud-based services have become part of our day-to-day software solutions. The identity
authentication process is considered to be the main gateway to these services. As such …

Security notions and generic constructions for client puzzles

L Chen, P Morrissey, NP Smart, B Warinschi - Advances in Cryptology …, 2009 - Springer
By a computational puzzle we mean a mildly difficult computational problem that requires
resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses …

Moderately hard functions: Definition, instantiations, and applications

J Alwen, B Tackmann - … Conference, TCC 2017, Baltimore, MD, USA …, 2017 - Springer
Several cryptographic schemes and applications are based on functions that are both
reasonably efficient to compute and moderately hard to invert, including client puzzles for …