-
2
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
LNCS 773, Springer-Verlag
-
A. Blum, M. Furst, M. Kearns, and R. J. Lipton. Cryptographic Primitives Based on Hard Learning Problems. Crypto '93, pp. 278-291, LNCS 773, Springer-Verlag, 1994.
-
(1994)
Crypto '93
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.J.4
-
3
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query problem
-
4, July
-
A. Blum, A. Kalai, and H. Wasserman. Noise-tolerant Learning, the Parity Problem, and the Statistical Query Problem Journal of the ACM 50,4, July 2003, pp. 506-519.
-
(2003)
Journal of the ACM
, vol.50
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
4
-
-
33845920117
-
HB++: A lightweight authentication protocol secure againt some attacks
-
Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU
-
J. Bringer, H. Chabanne, and E. Dottax. HB++: A Lightweight Authentication Protocol Secure againt Some Attacks. IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU, 2006 Available at http://eprint.iacr.org/2005/440.
-
(2006)
IEEE International Conference on Pervasive Services
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
6
-
-
0024868772
-
A hard predicate for all one-way functions
-
ACM
-
O. Goldreich and L. Levin. A Hard Predicate for all one-way functions, STOC '89, pp. 25-32, ACM 1998.
-
(1998)
STOC '89
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
7
-
-
0030671781
-
Some optimal inapproximability results
-
ACM
-
J. Hastad. Some Optimal Inapproximability Results, STOC '97, pp. 1-10, ACM 1997.
-
(1997)
STOC '97
, pp. 1-10
-
-
Hastad, J.1
-
8
-
-
70349284581
-
Secure human identification protocols
-
LNCS 2248, Springer-Verlag
-
N. Hopper and M. Blum. Secure Human Identification Protocols ASIACRYPT '01, pp. 52-66, LNCS 2248, Springer-Verlag, 2001.
-
(2001)
ASIACRYPT '01
, pp. 52-66
-
-
Hopper, N.1
Blum, M.2
-
9
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
LNCS 3621, Springer-Verlag. Updated version
-
A. Juels and S. Weis. Authenticating Pervasive Devices with Human Protocols Crypto 2005, pp. 293-308, LNCS 3621, Springer-Verlag, 2005. Updated version available at: http://www.rsasecurity.com/rsalabs/staff/ bios/ajuels/publications/pdfs/lpn.pdf.
-
(2005)
Crypto 2005
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
10
-
-
51349156259
-
Parallel and concurrent security of the HB and HB+ protocols
-
pp., LNCS 4004, Springer-Verlag
-
J. Katz and J. Sun Shin. Parallel and Concurrent Security of the HB and HB+ Protocols. Eurocrypt '06, pp., LNCS 4004, Springer-Verlag, 2006.
-
(2006)
Eurocrypt '06
-
-
Katz, J.1
Shin, J.S.2
-
11
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
M. Kearns. Efficient Noise-Tolerant Learning from Statistical Queries. J. ACM, 45(6): 983-1006, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
13
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
ACM
-
O. Regev. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography STOC 2005, pp. 84-93, ACM 2005.
-
(2005)
STOC 2005
, pp. 84-93
-
-
Regev, O.1
-
14
-
-
84937428040
-
A generalized birthday problem
-
LNCS 2442, Springer-Verlag
-
D. Wagner. A Generalized Birthday Problem Crypto 2002, pp. 288-303, LNCS 2442, Springer-Verlag, 2002.
-
(2002)
Crypto 2002
, pp. 288-303
-
-
Wagner, D.1
|