Login / Signup
Cryptographic puzzles and DoS resilience, revisited.
Bogdan Groza
Bogdan Warinschi
Published in:
Des. Codes Cryptogr. (2014)
Keyphrases
</>
smart card
hash functions
fault tolerance
security protocols
constraint satisfaction
databases
denial of service
high assurance
key management
cryptographic algorithms
digital signature
crossword puzzles
encryption key
network attacks
s box
dos attacks
missing data
real world