Главная
Study mode:
on
1
Intro
2
Motivation: Offline Attacks
3
Offline Attacks: A Common Problem
4
Desiderata: Moderately Hard Function
5
What is the ASIC Advantage?
6
Reducing ASIC Advantage
7
Data Independent Memory Hard Function (IMHF)
8
Data Independent Labeling Function GH
9
Evaluating an iMHF (red-blue pebbling)
10
Red-Blue Pebbling Cost RD17
11
What iMHFs are maximally bandwidth hard?
12
Pebbling Reduction?
13
Energy Cost of an Algorithm
14
Energy Cost of a Function
15
Pebbling Reduction: Random Oracle Model
16
Pebbling Lower Bounds
17
Conclusion
Description:
Explore the concept of Memory Hard Functions (MHFs) and their applications in password hashing, key stretching, and proofs of work in this 30-minute ACM conference talk. Delve into the motivation behind MHFs, including their role in addressing the computational speed disparity between general-purpose CPUs and Application Specific Integrated Circuits (ASICs). Examine various metrics for quantifying memory hardness and learn about Data Independent Memory Hard Functions (IMHFs). Investigate the evaluation of iMHFs through red-blue pebbling, energy cost analysis, and pebbling reductions in the Random Oracle Model. Gain insights into bandwidth-hard functions, their reductions, and lower bounds, concluding with an overview of the importance of MHFs in modern cryptographic applications.

Bandwidth-Hard Functions - Reductions and Lower Bounds

Association for Computing Machinery (ACM)
Add to list