Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks, the 1999 Network and Distributed System Security Symposium (NDSS '99), pp.151-165, 1999. ,
DoS-resistant authentication with client puzzles, pp.170-181, 2000. ,
DOI : 10.1007/3-540-44810-1_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.9259
The case for TCP/IP Puzzles, ACM SIGCOMM 2003 Workshops, pp.25-27, 2003. ,
Time-lock Puzzles and Timed-release Crypto, 1996. ,
Proofs of work and bread pudding protocols, the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security (CMS 99, 1999. ,
Adaptive Threshold Puzzles, EUROCON 2005, The International Conference on "Computer as a Tool", 2005. ,
DOI : 10.1109/EURCON.2005.1630012
Mitigating denial of service attacks with password puzzles, International Conference on Information Technology: Coding and Computing (ITCC'05), Volume II, pp.621-626, 2005. ,
DOI : 10.1109/ITCC.2005.200
On Chained Cryptographic Puzzles, 3rd Romanian- Hungarian Joint Symposium on Applied Computational Intelligence (SACI), 2006. ,
Practical client puzzle from repeated squaring, 2009. ,
Factoring polynomials with rational coefficients, Mathematische Annalen, vol.32, issue.4, pp.515-534, 1982. ,
DOI : 10.1007/BF01457454
Lattice Reduction: A Toolbox for the Cryptanalyst, Journal of Cryptology, vol.11, issue.3, pp.161-185, 1998. ,
DOI : 10.1007/s001459900042
Lattice Reduction in Cryptology: An Update, ANTS- IV: Proceedings of the 4th International Symposium on Algorithmic Number Theory, pp.85-112, 2000. ,
DOI : 10.1007/10722028_4
Toward Non-parallelizable Client Puzzles, CANS'07: 6th International Conference on Cryptology & Network Security, 2007. ,
DOI : 10.1007/978-3-540-76969-9_16
Improved low-density subset sum algorithms, Computational Complexity, vol.9, issue.1, pp.111-128, 1992. ,
DOI : 10.1007/BF01201999
A cost-based framework for analysis of denial of service in networks, Journal of Computer Security, vol.9, issue.1-2, pp.143-164, 2001. ,
DOI : 10.3233/JCS-2001-91-206