all InfoSec news
Bandwidth-Hard Functions from Random Permutations. (arXiv:2207.11519v1 [cs.CR])
July 26, 2022, 1:20 a.m. | Rishiraj Bhattacharyya, Avradip Mandal
cs.CR updates on arXiv.org arxiv.org
ASIC hash engines are specifically optimized for parallel computations of
cryptographic hashes and thus a natural environment for mounting brute-force
attacks on hash functions. Two fundamental advantages of ASICs over general
purpose computers are the area advantage and the energy efficiency. The
memory-hard functions approach the problem by reducing the area advantage of
ASICs compared to general-purpose computers. Traditionally, memory-hard
functions have been analyzed in the (parallel) random oracle model. However, as
the memory-hard security game is multi-stage, indifferentiability does …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Engineering Manager - Cloud Security team
@ SentinelOne | Prague, Czech Republic
Legal & Compliance Apprentice (H/F)
@ Novo Nordisk | Puteaux, Île-de-France, FR
Manager, Governance Risk & Compliance
@ Comcast | Virtual