-
1
-
-
0031334110
-
Does parallel repetition lower the error in computationally sound protocols?
-
IEEE, New York
-
M. Bellare, R. Impagliazzo, M. Naor. Does parallel repetition lower the error in computationally sound protocols?, in 38th IEEE Symposium on Foundations of Computer Science (IEEE, New York, 1997), pp. 374-383.
-
(1997)
38th IEEE Symposium on Foundations of Computer Science
, pp. 374-383
-
-
Bellare, M.1
Impagliazzo, R.2
Naor, M.3
-
3
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
LNCS, (Springer, Berlin)
-
A. Blum, M. Furst, M. Kearns, R. Lipton, Cryptographic primitives based on hard learning problems, in Adv. in Cryptology-Crypto'93. LNCS, vol. 773 (Springer, Berlin, 1994), pp. 278-291.
-
(1994)
Adv. in Cryptology-Crypto'93
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.4
-
4
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
A. Blum, A. Kalai, H. Wasserman, Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003).
-
(2003)
J. ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
5
-
-
33845920117
-
++: A lightweight authentication protocol secure against some attacks
-
ed. by P. Georgiadis, J. Lopez, S. Gritzalis, G. Marias (IEEE Computer Society Press, Los Alamitos)
-
++: A lightweight authentication protocol secure against some attacks, in Proceedings of SecPerU 2006, ed. by P. Georgiadis, J. Lopez, S. Gritzalis, G. Marias (IEEE Computer Society Press, Los Alamitos, 2006), pp. 28-33.
-
(2006)
Proceedings of SecPerU 2006
, pp. 28-33
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
6
-
-
0037605775
-
Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds
-
R. Canetti, J. Kilian, E. Petrank, A. Rosen, Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds. SIAM J. Comput. 32(1), 1-47 (2002).
-
(2002)
SIAM J. Comput.
, vol.32
, Issue.1
, pp. 1-47
-
-
Canetti, R.1
Kilian, J.2
Petrank, E.3
Rosen, A.4
-
7
-
-
24144435673
-
Hardness amplification of weakly verifiable puzzles
-
LNCS, (Springer, Berlin)
-
R. Canetti, S. Halevi, M. Steiner. Hardness amplification of weakly verifiable puzzles, in 2nd Theory of Cryptography Conference (TCC 2005). LNCS, vol. 3378 (Springer, Berlin, 2005), pp. 17-33.
-
(2005)
2nd Theory of Cryptography Conference (TCC 2005)
, vol.3378
, pp. 17-33
-
-
Canetti, R.1
Halevi, S.2
Steiner, M.3
-
8
-
-
84948963042
-
On the security of some cryptosystems based on error-correcting codes
-
LNCS, (Springer, Berlin)
-
F. Chabaud, On the security of some cryptosystems based on error-correcting codes, in Adv. in Cryptology-Eurocrypt '94. LNCS, vol. 950 (Springer, Berlin, 1995), pp. 131-139.
-
(1995)
Adv. in Cryptology-Eurocrypt '94
, vol.950
, pp. 131-139
-
-
Chabaud, F.1
-
10
-
-
0024984004
-
Witness indistinguishability and witness hiding protocols
-
ACM, New York
-
U. Feige, A. Shamir, Witness indistinguishability and witness hiding protocols, in 22nd ACM Symposium on Theory of Computing (ACM, New York, 1990), pp. 416-426.
-
(1990)
22nd ACM Symposium on Theory of Computing
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
11
-
-
84998808084
-
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication
-
LNCS, (Springer, Berlin)
-
M. Fossorier, M.J.Mihaljevic, H. Imai, Y. Cui, K.Matsuura, An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication, in Progress in Cryptology-INDOCRYPT 2006. LNCS, vol. 4329 (Springer, Berlin, 2006), pp. 48-62.
-
(2006)
Progress in Cryptology-INDOCRYPT 2006
, vol.4329
, pp. 48-62
-
-
Fossorier, M.1
Mihaljevic, M.J.2
Imai, H.3
Cui, Y.4
Matsuura, K.5
-
13
-
-
54249085502
-
+ are hard to find
-
LNCS, (Springer, Berlin)
-
+ are hard to find, in Financial Cryptography and Data Security, FC 2008. LNCS, vol. 5143 (Springer, Berlin, 2008), pp. 156-170.
-
(2008)
Financial Cryptography and Data Security, FC 2008
, vol.5143
, pp. 156-170
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
14
-
-
44449155290
-
#: Increasing the security and efficiency of HB
-
LNCS, (Springer, Berlin)
-
#: Increasing the security and efficiency of HB+, in Adv. in Cryptology-EUROCRYPT 2008. LNCS, vol. 4965 (Springer, Berlin, 2008), pp. 361-378.
-
(2008)
Adv. in Cryptology-EUROCRYPT 2008
, vol.4965
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
16
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
O. Goldreich, H. Krawczyk, On the composition of zero-knowledge proof systems. SIAM J. Comput. 25(1), 169-192 (1996).
-
(1996)
SIAM J. Comput.
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
17
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
O. Goldreich, Y. Oren, Definitions and properties of zero-knowledge proof systems. J. Cryptol. 7(1), 1-32 (1994).
-
(1994)
J. Cryptol.
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
20
-
-
0000844603
-
Some optimal inapproximability results
-
J. Håstad, Some optimal inapproximability results. J. ACM 48(4), 798-859 (2001).
-
(2001)
J. ACM
, vol.48
, Issue.4
, pp. 798-859
-
-
Håstad, J.1
-
22
-
-
70349284581
-
Secure human identification protocols
-
LNCS, (Springer, Berlin)
-
N. Hopper, M. Blum, Secure human identification protocols, in Adv. in Cryptology-Asiacrypt 2001. LNCS, vol. 2248 (Springer, Berlin, 2001), pp. 52-66.
-
(2001)
Adv. in Cryptology-Asiacrypt 2001
, vol.2248
, pp. 52-66
-
-
Hopper, N.1
Blum, M.2
-
23
-
-
0001336166
-
A new upper bound for error-correcting codes
-
S.M. Johnson, A new upper bound for error-correcting codes. IRE Trans. Inf. Theory 8(3), 203-207 (1962).
-
(1962)
IRE Trans. Inf. Theory
, vol.8
, Issue.3
, pp. 203-207
-
-
Johnson, S.M.1
-
24
-
-
0005861105
-
Improved asymptotic bounds for error-correcting codes
-
S.M. Johnson, Improved asymptotic bounds for error-correcting codes. IEEE Trans. Inf. Theory 9(3), 198-205 (1963).
-
(1963)
IEEE Trans. Inf. Theory
, vol.9
, Issue.3
, pp. 198-205
-
-
Johnson, S.M.1
-
25
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
LNCS, (Springer, Berlin), Updated version available at
-
A. Juels, S. Weis, Authenticating pervasive devices with human protocols, in Adv. in Cryptology-Crypto 2005. LNCS, vol. 3621 (Springer, Berlin, 2005), pp. 293-308. Updated version available at: http://www.rsasecurity.com/rsalabs/ staff/bios/ajuels/publications/pdfs/lpn.pdf.
-
(2005)
Adv. in Cryptology-Crypto 2005
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
26
-
-
33746104831
-
+ protocols
-
LNCS, (Springer, Berlin)
-
+ protocols, in Adv. in Cryptology-Eurocrypt 2006. LNCS, vol. 4004 (Springer, Berlin, 2006), pp. 73-87.
-
(2006)
Adv. in Cryptology-Eurocrypt 2006
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.-S.2
-
28
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
M. Kearns, Efficient noise-tolerant learning from statistical queries. J. ACM 45(6), 983-1006 (1998).
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
31
-
-
33749998666
-
An improved LPN algorithm
-
LNCS, (Springer, Berlin)
-
E. Levieil, P.-A. Fouque, An improved LPN algorithm, in Security and Cryptography for Networks (SCN 2006). LNCS, vol. 4116 (Springer, Berlin, 2006), pp. 348-359.
-
(2006)
Security and Cryptography for Networks (SCN 2006)
, vol.4116
, pp. 348-359
-
-
Levieil, E.1
Fouque, P.-A.2
-
32
-
-
26944487960
-
The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem
-
LNCS, (Springer, Berlin)
-
V. Lyubashevsky, The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem, in 9th Intl. Workshop on Randomization and Computation (RANDOM 2005). LNCS, vol. 3624 (Springer, Berlin, 2005), pp. 378-389.
-
(2005)
9th Intl. Workshop on Randomization and Computation (RANDOM 2005)
, vol.3624
, pp. 378-389
-
-
Lyubashevsky, V.1
-
33
-
-
34247523203
-
HB-MP: A further step in the hb-family of lightweight authentication protocols
-
J. Munilla, A. Peinado, HB-MP: A further step in the hb-family of lightweight authentication protocols. Comput. Netw. 51, 2262-2267 (2007).
-
(2007)
Comput. Netw.
, vol.51
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
-
34
-
-
35448969719
-
An efficient parallel repetition theorem for Arthur-Merlin games
-
ACM, New York
-
R. Pass, M. Venkitasubramaniam, An efficient parallel repetition theorem for Arthur-Merlin games, in 39th ACM Symposium on Theory of Computing (ACM, New York, 2007), pp. 420-429.
-
(2007)
39th ACM Symposium on Theory of Computing
, pp. 420-429
-
-
Pass, R.1
Venkitasubramaniam, M.2
-
35
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem
-
ACM, New York
-
C. Peikert, Public-key cryptosystems from the worst-case shortest vector problem, in 41st ACM Symposium on Theory of Computing (ACM, New York, 2009), pp. 333-342.
-
(2009)
41st ACM Symposium on Theory of Computing
, pp. 333-342
-
-
Peikert, C.1
-
36
-
-
0001226672
-
A parallel repetition theorem
-
R. Raz, A parallel repetition theorem. SIAM J. Comput. 27(3), 763-803 (1998).
-
(1998)
SIAM J. Comput.
, vol.27
, Issue.3
, pp. 763-803
-
-
Raz, R.1
-
37
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
ACM, New York
-
O. Regev, On lattices, learning with errors, random linear codes, and cryptography, in 37th ACM Symposium on Theory of Computing (ACM, New York, 2005), pp. 84-93.
-
(2005)
37th ACM Symposium on Theory of Computing
, pp. 84-93
-
-
Regev, O.1
|