-
1
-
-
38349081055
-
-
Aumasson, J.-P., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: A Hardware-Oriented Trapdoor Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, 4586, pp. 184-199. Springer, Heidelberg (2007)
-
Aumasson, J.-P., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: A Hardware-Oriented Trapdoor Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 184-199. Springer, Heidelberg (2007)
-
-
-
-
2
-
-
0031351741
-
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In: Proceedings of FOCS 1997, pp. 394-403 (1997)
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In: Proceedings of FOCS 1997, pp. 394-403 (1997)
-
-
-
-
3
-
-
84937407719
-
Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
4
-
-
0017973512
-
On the Inherent Intractability of Certain Coding Problems
-
Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the Inherent Intractability of Certain Coding Problems. IEEE Trans. Info. Theory 24, 384-386 (1978)
-
(1978)
IEEE Trans. Info. Theory
, vol.24
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
van Tilborg, H.C.A.3
-
5
-
-
84877639283
-
Cryptographic Primitives Based on Hard Learning Problems
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Blum, A., Furst, M., Kearns, M., Lipton, R.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.4
-
6
-
-
24144453496
-
-
Blum, A., Kalai, A., Wasserman, H.: Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model. J. ACM 50(4), 506-519 (2003); Preliminary version. In: Proceedings of STOC 2000
-
Blum, A., Kalai, A., Wasserman, H.: Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model. J. ACM 50(4), 506-519 (2003); Preliminary version. In: Proceedings of STOC 2000
-
-
-
-
7
-
-
33845920117
-
++: A Lightweight Authentication Protocol Secure Against Some Attacks
-
IEEE Computer Society Press, Los Alamitos
-
++: A Lightweight Authentication Protocol Secure Against Some Attacks. In: Proceedings of SecPerU 2006, pp. 28-33. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Proceedings of SecPerU
, pp. 28-33
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
8
-
-
0343337504
-
Nonmalleable Cryptography
-
Dolev, D., Dwork, C., Naor, M.: Nonmalleable Cryptography. SIAM Journal of Computing 30(2), 391-437 (2000)
-
(2000)
SIAM Journal of Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
9
-
-
44449175875
-
+ Against GRS Man-in-the-Middle Attack
-
January, pp
-
+ Against GRS Man-in-the-Middle Attack. In: Institute of Electronics, Information and Communication Engineers, Symposium on Cryptography and Information Security, January, pp. 23-26 (2007)
-
(2007)
Institute of Electronics, Information and Communication Engineers, Symposium on Cryptography and Information Security
, pp. 23-26
-
-
Duc, D.N.1
Kim, K.2
-
10
-
-
44449085670
-
-
Fossorier, M.P.C., Mihaljevic, M.J., Imai, H., Cui, Y., Matsuura, K.: A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication., http://eprint.iacr.org/ 2006/197.pdf
-
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
-
-
Fossorier, M.P.C.1
Mihaljevic, M.J.2
Imai, H.3
Cui, Y.4
Matsuura, K.5
-
12
-
-
44449155290
-
-
+. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, 4965, pp. 361-378. Springer, Heidelberg (2008)
-
+. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361-378. Springer, Heidelberg (2008)
-
-
-
-
14
-
-
0024137231
-
On the Existence of Pseudorandom Generators
-
Goldreich, O., Krawczyk, H., Luby, M.: On the Existence of Pseudorandom Generators. In: Proceedings of FOCS 1988, pp. 12-21 (1988)
-
(1988)
Proceedings of FOCS 1988
, pp. 12-21
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
16
-
-
0000844603
-
Some Optimal Inapproximability Results
-
Håstad, J.: Some Optimal Inapproximability Results. J. ACM 48(4), 798-859 (2001)
-
(2001)
J. ACM
, vol.48
, Issue.4
, pp. 798-859
-
-
Håstad, J.1
-
17
-
-
70349284581
-
Secure Human Identification Protocols
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Hopper, N., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.1
Blum, M.2
-
18
-
-
0025566725
-
No Better Ways to Generate Hard NP Instances than Picking Uniformly at Random
-
Impagliazzo, R., Levin, L.A.: No Better Ways to Generate Hard NP Instances than Picking Uniformly at Random. In: Proceedings of FOCS 1990, pp. 812-821 (1990)
-
(1990)
Proceedings of FOCS 1990
, pp. 812-821
-
-
Impagliazzo, R.1
Levin, L.A.2
-
19
-
-
33745181952
-
Authenticating Pervasive Devices With Human Protocols
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Juels, A., Weis, S.A.: Authenticating Pervasive Devices With Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
20
-
-
33746104831
-
+ Protocols
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
+ Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73-87. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.2
-
21
-
-
49149084810
-
Protocols in the "Large Error" Case
-
+
-
+ Protocols in the "Large Error" Case, http://eprint.iacr.org/2006/326.pdf
-
-
-
Katz, J.1
Smith, A.2
-
22
-
-
29644436249
-
Complete Characterization of Security Notions for Probabilistic Private-Key Encryption. Journal of Cryptology 19(1), 67-95 (2006); Preliminary version
-
Katz, J., Yung, M.: Complete Characterization of Security Notions for Probabilistic Private-Key Encryption. Journal of Cryptology 19(1), 67-95 (2006); Preliminary version. In: Proceedings of STOC 2000
-
(2000)
Proceedings of STOC
-
-
Katz, J.1
Yung, M.2
-
23
-
-
33749998666
-
-
Levieil, E., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 348-359. Springer, Heidelberg (2006)
-
Levieil, E., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348-359. Springer, Heidelberg (2006)
-
-
-
-
26
-
-
34247523203
-
HB-MP: A Further Step in the HB-family of Lightweight Authentication Protocols
-
Munilla, J., Peinado, A.: HB-MP: A Further Step in the HB-family of Lightweight Authentication Protocols. Computer Networks 51, 2262-2267 (2007)
-
(2007)
Computer Networks
, vol.51
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
-
28
-
-
33745571012
-
On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
-
Regev, O.: On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. In: Proceedings of STOC 2005, pp. 84-93 (2005)
-
(2005)
Proceedings of STOC 2005
, pp. 84-93
-
-
Regev, O.1
|