Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
52
views
30
references
Top references
cited by
16
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,706
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2018 : 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I
Verifiable Delay Functions
other
Author(s):
Dan Boneh
,
Joseph Bonneau
,
Benedikt Bünz
,
Ben Fisch
Publication date
(Online):
July 25 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
30
Record
: found
Abstract
: not found
Book Chapter
: not found
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias
,
Alexander Russell
,
Bernardo David
…
(2017)
0
comments
Cited
126
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The Sybil Attack
John Douceur
(2002)
0
comments
Cited
103
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Password security: a case history
Robert W. Morris
,
Ken Thompson
(1979)
0
comments
Cited
80
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
July 25 2018
Pages
: 757-788
DOI:
10.1007/978-3-319-96884-1_25
SO-VID:
eea75a4f-14a6-4b57-9244-c0f20f3ffef0
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 662
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit
pp. 389
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization
pp. 657
Collective Evolutionary Concept Distance Based Query Expansion for Effective Web Document Retrieval
pp. 757
Verifiable Delay Functions
Similar content
3,706
[Determination of the arm circumference in newborn infants as a method of verifying low birth weight].
Authors:
J G Alves
,
G M Lima
,
G N Azevedo
…
Verified microcode design
Authors:
David Shepherd
Peer Verified Methods Program, Manual on Policies and Procedures
Authors:
See all similar
Cited by
16
A Survey on Ethereum Systems Security : Vulnerabilities, Attacks, and Defenses
Authors:
Huashan Chen
,
Marcus Pendleton
,
Laurent Njilla
…
A Survey of Blockchain Consensus Protocols
Authors:
Jie Xu
,
Cong Wang
,
Xiaohua Jia
Secure large‐scale E‐voting system based on blockchain contract using a hybrid consensus model combined with sharding
Authors:
Yousif Abuidris
,
Rajesh M Kumar
,
Ting Yang
…
See all cited by