Corpus ID: 14943685

Egalitarian Computing

@inproceedings{Biryukov2016EgalitarianC,
  title={Egalitarian Computing},
  author={A. Biryukov and D. Khovratovich},
  booktitle={USENIX Security Symposium},
  year={2016}
}
  • A. Biryukov, D. Khovratovich
  • Published in USENIX Security Symposium 2016
  • Computer Science
  • In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an attack. These include password processing, hard-drive protection, cryptocurrency mining, resource sharing, code obfuscation, etc. We suggest memory-hard computing as a generic paradigm, where every task is amalgamated with a certain procedure requiring intensive access to RAM both in terms of size and (very importantly) bandwidth, so that transferring the computation… CONTINUE READING

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 12 CITATIONS

    Itsuku: a Memory-Hardened Proof-of-Work Scheme

    VIEW 10 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Evaluating memory-hard proof-of-work algorithms on three processors

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Symmetrically and Asymmetrically Hard Cryptography

    VIEW 2 EXCERPTS
    CITES BACKGROUND

    Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme

    VIEW 10 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Protecting Early Stage Proof-of-Work Based Public Blockchain

    VIEW 1 EXCERPT

    References

    Publications referenced by this paper.