Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
27
views
20
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,781
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – EUROCRYPT 2017
Depth-Robust Graphs and Their Cumulative Memory Complexity
other
Author(s):
Joël Alwen
,
Jeremiah Blocki
,
Krzysztof Pietrzak
Publication date
(Online):
April 01 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Embodied Memory
Most cited references
20
Record
: found
Abstract
: not found
Book Chapter
: not found
Proofs of Space
Stefan Dziembowski
,
Sebastian Faust
,
Vladimir Kolmogorov
…
(2015)
0
comments
Cited
30
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On Memory-Bound Functions for Fighting Spam
Cynthia Dwork
,
Andrew Goldberg
,
Moni Naor
(2003)
0
comments
Cited
22
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Report
: not found
PKCS #5: Password-Based Cryptography Specification Version 2.0
B. Kaliski
(2000)
0
comments
Cited
18
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
April 01 2017
Pages
: 3-32
DOI:
10.1007/978-3-319-56617-7_1
SO-VID:
98f59729-d806-42fc-b5e2-840570cf0447
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Depth-Robust Graphs and Their Cumulative Memory Complexity
pp. 216
New Collision Attacks on Round-Reduced Keccak
pp. 519
0-RTT Key Exchange with Full Forward Secrecy
pp. 33
Scrypt Is Maximally Memory-Hard
pp. 551
Computational Integrity with a Public Random String from Quasi-Linear PCPs
Similar content
1,781
The depth of chemical time and the power of enzymes as catalysts.
Authors:
Richard Wolfenden
,
Mark Snider
Advanced Facilitator Guide For In-Depth Ripple Effects Mapping
Authors:
D Hansen
,
L Higgins
,
R. Seró
High cumulative incidence of uterine leiomyoma in black and white women: Ultrasound evidence
Authors:
Donna Baird
,
David Dunson
,
Michael Hill
…
See all similar
Cited by
8
Verifiable Delay Functions
Authors:
Dan Boneh
,
Joseph Bonneau
,
Benedikt Bunz
…
Scrypt Is Maximally Memory-Hard
Authors:
Joel Alwen
,
Binyi Chen
,
Krzysztof Pietrzak
…
Moderately Hard Functions: Definition, Instantiations, and Applications
Authors:
Joel Alwen
,
Björn Tackmann
See all cited by