Back to Results
First PageMeta Content
CPU cache / Cache / Memory hierarchy / Lookup table / Proof-of-work system / Parallel computing / Transmission Control Protocol / Algorithm / Computer memory / Computing / Memory bound function


Exponential Memory-Bound Functions for Proof of Work Protocols Technical Report A/370/CRI version 3 Fabien Coelho () ´ CRI, Ecole
Add to Reading List

Document Date: 2006-11-07 05:21:26


Open Document

File Size: 186,50 KB

Share Result on Facebook

City

Paris / Fontainebleau / /

Company

Intel / /

Country

France / /

Currency

pence / /

/

IndustryTerm

enumeration search / clever algorithm / 2nℓ sequence enumeration algorithm / et al. algorithm / interactive challenge-response protocols / overall optimized search / web-sites / work protocols / non deterministic algorithm / large search space / cache hardware / iterative search / non-best algorithms / search result / cryptographic-strong software function / above algorithm / heterogeneous hardware / search history / overall search complexity / search algorithm / client solution / inner protocol / synchronous end-to-end client-server protocols / valid-path 2ℓ enumeration search / search algorithms / non-deterministic algorithm / solution search / work protocol / parallel search / recursive search / valid path search / help audit / search algorithm implementation / Internet electronic mail user / search process memory / infinite search space / Internet users / forward challengeresponse protocol / solution-verification protocols / challenge-response protocol / search space / search time / digital data preservation protocol / /

Position

The Hokkaido protocol The forward / /

Technology

challenge-response protocol / above algorithm / solution-verification protocols / Interactive Challenge-Response Protocol / clever algorithm / search algorithm / search algorithms / non-deterministic algorithm / Dwork et al. algorithm / digital data preservation protocol / one processor / non deterministic algorithm / work protocols / work protocol / inner protocol / 3 The Hokkaido protocol / forward challengeresponse protocol / interactive challenge-response protocols / client-server protocols / 2nℓ sequence enumeration algorithm / /

SocialTag