Hashcash

Results: 43



#Item
21Graphics hardware / Electronics / Nvidia / Video cards / Parallel computing / Hashcash / OpenCL / Proof-of-work system / SHA-1 / Computing / Computer hardware / GPGPU

Hashcash overview OpenCL My implementation of Hashcash

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2013-12-12 07:49:41
22Cyberwarfare / Denial-of-service attacks / Cryptography / Proof-of-work system / Spam filtering / Hashcash / Adam Back / SYN cookies / Transmission Control Protocol / Computing / Computer network security / Computer security

Hashcash - A Denial of Service Counter-Measure Adam Back e-mail: 1st August 2002 Abstract Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:39:34
23Spam filtering / Computer security / Hash function / Computing / Cyberwarfare / Proof-of-work system / Search algorithms / Email authentication / Hashcash

Hashcash - Amortizable Publicly Auditable Cost-Functions Adam Back e-mail: 1st August 2002 Abstract We present a distributed efficiently amortizable CPU cost-function with no trap–door. The absence

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:55
24Big O notation / Mathematical notation / Midpoint circle algorithm / Control table / Analysis of algorithms / Mathematics / Asymptotic analysis

Moderately Hard, Memory-bound Functions Mart´ın Abadi University of California at Santa Cruz Abstract A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2005-01-15 19:23:53
25Computing / Hashing / Mathematics / Applied mathematics / Hash table / Hash function / Parallel computing / Algorithm / Collision / Cryptographic hash functions / Search algorithms / Cryptography

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-01-13 13:07:17
26Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Trie / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
27Institute of Electrical and Electronics Engineers / Engineering / Measurement / Technology / Zero-knowledge password proof / IEEE Reliability Society / International nongovernmental organizations / Standards organizations / Professional associations

Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP’ $17.00 © 2003 IEEE Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP’ $17.00 © 2003 IEEE

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:58
28Concurrent computing / File sharing networks / Chord / Peer-to-peer / Freenet / Coin / Pastry / Distributed data storage / Software / Computing

Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications Flavio D. Garcia and Jaap-Henk Hoepman Institute for Computing and Information Science, Radboud University, Nijmegen, The Netherlands. {flav

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-04-20 07:18:43
29Institute of Electrical and Electronics Engineers / Engineering / Measurement / Technology / Zero-knowledge password proof / IEEE Reliability Society / International nongovernmental organizations / Standards organizations / Professional associations

Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP’ $17.00 © 2003 IEEE Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP’ $17.00 © 2003 IEEE

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2005-01-15 19:23:58
30Computer memory / Statistics / CPU cache / Central processing unit / Lookup table / Bit array / Random walk / Logarithm / Cache-oblivious algorithm / Computing / Arrays / Cache

On Memory-Bound Functions for Fighting Spam Cynthia Dwork1 , Andrew Goldberg1, and Moni Naor2? 1 Microsoft Research, SVC 1065 L’Avenida

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:52
UPDATE