[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions

A Miller, A Kosba, J Katz, E Shi - Proceedings of the 22Nd acm sigsac …, 2015 - dl.acm.org
An implicit goal of Bitcoin's reward structure is to diffuse network influence over a diverse,
decentralized population of individual participants. Indeed, Bitcoin's security claims rely on …

Proofs of work from worst-case assumptions

M Ball, A Rosen, M Sabin, PN Vasudevan - … , CA, USA, August 19–23, 2018 …, 2018 - Springer
Abstract We give Proofs of Work (PoWs) whose hardness is based on well-studied worst-
case assumptions from fine-grained complexity theory. This extends the work of (Ball et al …

CommitCoin: Carbon Dating Commitments with Bitcoin: (Short Paper)

J Clark, A Essex - International conference on financial cryptography and …, 2012 - Springer
In the standard definition of a commitment scheme, the sender commits to a message and
immediately sends the commitment to the recipient interested in it. However the sender may …

Balloon hashing: A memory-hard function providing provable protection against sequential attacks

D Boneh, H Corrigan-Gibbs, S Schechter - … 4-8, 2016, Proceedings, Part I …, 2016 - Springer
We present the Balloon password-hashing algorithm. This is the first practical cryptographic
hash function that:(i) has proven memory-hardness properties in the random-oracle …

Graphchain: A blockchain-free scalable decentralised ledger

X Boyen, C Carr, T Haines - Proceedings of the 2nd ACM Workshop on …, 2018 - dl.acm.org
Blockchain-based replicated ledgers, pioneered in Bitcoin, are effective against double
spending, but inherently attract centralised mining pools and incompressible transaction …

DoS attacks on blockchain ecosystem

M Raikwar, D Gligoroski - European Conference on Parallel Processing, 2021 - Springer
Abstract Denial of Service (DoS) attacks are a growing threat in network services. The
frequency and intensity of DoS attacks are rapidly increasing day by day. The immense …

Multi-instance security and its application to password-based cryptography

M Bellare, T Ristenpart, S Tessaro - Annual Cryptology Conference, 2012 - Springer
This paper develops a theory of multi-instance (mi) security and applies it to provide the first
proof-based support for the classical practice of salting in password-based cryptography. Mi …

To Hash or Not to Hash Again?(In) Differentiability Results for and HMAC

Y Dodis, T Ristenpart, J Steinberger… - Annual Cryptology …, 2012 - Springer
We show that the second iterate H^ 2 (M)= H (H (M)) of a random oracle H cannot achieve
strong security in the sense of indifferentiability from a random oracle. We do so by proving …

Blockchain-free cryptocurrencies: A framework for truly decentralised fast transactions

X Boyen, C Carr, T Haines - Cryptology ePrint Archive, 2016 - eprint.iacr.org
The" blockchain" distributed ledger pioneered by Bitcoin is effective at preventing double-
spending, but inherently attracts (1)" user cartels" and (2) incompressible delays, as a result …