Publisher
Information Processing Society of Japan
Reference17 articles.
1. [1] Chaudhary, K.C., Chand, V. and Fehnker, A.: Double-spending analysis of bitcoin, Proc. PACIS 2020 (2020).
2. [2] Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, Technical report, Manubot (2019).
3. [3] Chen, B. and Tessaro, S.: Memory-Hard Functions from Cryptographic Primitives, Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part II, Boldyreva, A. and Micciancio, D. (Eds.), Lecture Notes in Computer Science, Vol.11693, pp.543-572, Springer (online), DOI: 10.1007/978-3-030-26951-7_19 (2019).
4. [4] Boneh, D., Corrigan-Gibbs, H. and Schechter, S.E.: Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, Cheon, J.H. and Takagi, T. (Eds.), Lecture Notes in Computer Science, Vol.10031, pp.220-248 (online), DOI: 10.1007/978-3-662-53887-6_8 (2016).
5. [5] Biryukov, A., Dinu, D. and Khovratovich, D.: Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications, IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, March 21-24, 2016, pp.292-302, IEEE (online), DOI: 10.1109/EuroSP.2016.31 (2016).