YoVDO

Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Computational Complexity Courses Proof of Work Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of time-memory tradeoff attacks on the MTP (Merkle Tree Proof) proof of work scheme in this conference talk presented at Crypto 2017. Delve into the intricacies of proof of work systems, their disadvantages, and memory-hard functions. Examine the Argon2D algorithm, Merkle Hash Trees, and Poobah's Algorithm. Understand the attacker's goals, indexing functions, and the various phases involved in the MTP scheme. Investigate the computational complexity, preprocessing, and evaluation stages of these attacks. Gain valuable insights into the security implications and potential vulnerabilities of this proof of work mechanism.

Syllabus

Intro
Proof of Work
Disadvantages
Memory Hard Function
Argon 2D
MTP
Merkel Hash Tree
Poobahs Algorithm
Proof of Work Scheme
Attacker Goal
Indexing Function
Phases
Computational Complexity
Preprocessing
Evaluation
Conclusion


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera