Author of the publication

On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i.

, and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 445-465. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximating Cumulative Pebbling Cost is Unique Games Hard., , and . CoRR, (2019)Resolving the Complexity of Some Data Privacy Problems., and . ICALP (2), volume 6199 of Lecture Notes in Computer Science, page 393-404. Springer, (2010)Naturally Rehearsing Passwords., , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 361-380. Springer, (2013)On the Multi-User Security of Short Schnorr Signatures., and . IACR Cryptology ePrint Archive, (2019)An Economic Model for Quantum Key-Recovery Attacks against Ideal Ciphers., and . CoRR, (2020)Client-CASH: Protecting Master Passwords against Offline Attacks., and . AsiaCCS, page 165-176. ACM, (2016)On the Security of Proofs of Sequential Work in a Post-Quantum World., , and . ITC, volume 199 of LIPIcs, page 22:1-22:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions., and . ISIT, page 1841-1846. IEEE, (2021)On Explicit Constructions of Extremely Depth Robust Graphs., , , and . CoRR, (2021)CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection., and . CSF, page 371-386. IEEE Computer Society, (2016)