메뉴 건너뛰기




Volumn 5126 LNCS, Issue PART 2, 2008, Pages 679-690

How to encrypt with the LPN problem

Author keywords

Error correcting code; LPN; Symmetric encryption

Indexed keywords

CRYPTOGRAPHY; HARDNESS; INFORMATION THEORY; LINGUISTICS; TRANSLATION (LANGUAGES);

EID: 49149109143     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70583-3_55     Document Type: Conference Paper
Times cited : (54)

References (28)
  • 1
    • 38349081055 scopus 로고    scopus 로고
    • Aumasson, J.-P., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: A Hardware-Oriented Trapdoor Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, 4586, pp. 184-199. Springer, Heidelberg (2007)
    • Aumasson, J.-P., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: A Hardware-Oriented Trapdoor Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 184-199. Springer, Heidelberg (2007)
  • 2
    • 0031351741 scopus 로고    scopus 로고
    • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In: Proceedings of FOCS 1997, pp. 394-403 (1997)
    • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In: Proceedings of FOCS 1997, pp. 394-403 (1997)
  • 3
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 84877639283 scopus 로고
    • Cryptographic Primitives Based on Hard Learning Problems
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Blum, A., Furst, M., Kearns, M., Lipton, R.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 278-291
    • Blum, A.1    Furst, M.2    Kearns, M.3    Lipton, R.4
  • 6
    • 24144453496 scopus 로고    scopus 로고
    • Blum, A., Kalai, A., Wasserman, H.: Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model. J. ACM 50(4), 506-519 (2003); Preliminary version. In: Proceedings of STOC 2000
    • Blum, A., Kalai, A., Wasserman, H.: Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model. J. ACM 50(4), 506-519 (2003); Preliminary version. In: Proceedings of STOC 2000
  • 7
    • 33845920117 scopus 로고    scopus 로고
    • ++: A Lightweight Authentication Protocol Secure Against Some Attacks
    • IEEE Computer Society Press, Los Alamitos
    • ++: A Lightweight Authentication Protocol Secure Against Some Attacks. In: Proceedings of SecPerU 2006, pp. 28-33. IEEE Computer Society Press, Los Alamitos (2006)
    • (2006) Proceedings of SecPerU , pp. 28-33
    • Bringer, J.1    Chabanne, H.2    Dottax, E.3
  • 12
    • 44449155290 scopus 로고    scopus 로고
    • +. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, 4965, pp. 361-378. Springer, Heidelberg (2008)
    • +. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361-378. Springer, Heidelberg (2008)
  • 16
    • 0000844603 scopus 로고    scopus 로고
    • Some Optimal Inapproximability Results
    • Håstad, J.: Some Optimal Inapproximability Results. J. ACM 48(4), 798-859 (2001)
    • (2001) J. ACM , vol.48 , Issue.4 , pp. 798-859
    • Håstad, J.1
  • 17
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Hopper, N., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 52-66
    • Hopper, N.1    Blum, M.2
  • 18
    • 0025566725 scopus 로고
    • No Better Ways to Generate Hard NP Instances than Picking Uniformly at Random
    • Impagliazzo, R., Levin, L.A.: No Better Ways to Generate Hard NP Instances than Picking Uniformly at Random. In: Proceedings of FOCS 1990, pp. 812-821 (1990)
    • (1990) Proceedings of FOCS 1990 , pp. 812-821
    • Impagliazzo, R.1    Levin, L.A.2
  • 19
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices With Human Protocols
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Juels, A., Weis, S.A.: Authenticating Pervasive Devices With Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 20
    • 33746104831 scopus 로고    scopus 로고
    • + Protocols
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • + Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73-87. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.2
  • 21
    • 49149084810 scopus 로고    scopus 로고
    • Protocols in the "Large Error" Case
    • +
    • + Protocols in the "Large Error" Case, http://eprint.iacr.org/2006/326.pdf
    • Katz, J.1    Smith, A.2
  • 22
    • 29644436249 scopus 로고    scopus 로고
    • Complete Characterization of Security Notions for Probabilistic Private-Key Encryption. Journal of Cryptology 19(1), 67-95 (2006); Preliminary version
    • Katz, J., Yung, M.: Complete Characterization of Security Notions for Probabilistic Private-Key Encryption. Journal of Cryptology 19(1), 67-95 (2006); Preliminary version. In: Proceedings of STOC 2000
    • (2000) Proceedings of STOC
    • Katz, J.1    Yung, M.2
  • 23
    • 33749998666 scopus 로고    scopus 로고
    • Levieil, E., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 348-359. Springer, Heidelberg (2006)
    • Levieil, E., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348-359. Springer, Heidelberg (2006)
  • 26
    • 34247523203 scopus 로고    scopus 로고
    • HB-MP: A Further Step in the HB-family of Lightweight Authentication Protocols
    • Munilla, J., Peinado, A.: HB-MP: A Further Step in the HB-family of Lightweight Authentication Protocols. Computer Networks 51, 2262-2267 (2007)
    • (2007) Computer Networks , vol.51 , pp. 2262-2267
    • Munilla, J.1    Peinado, A.2
  • 28
    • 33745571012 scopus 로고    scopus 로고
    • On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
    • Regev, O.: On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. In: Proceedings of STOC 2005, pp. 84-93 (2005)
    • (2005) Proceedings of STOC 2005 , pp. 84-93
    • Regev, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.