-
1
-
-
79958009553
-
-
The full version of this paper will be posted on the, ePrint Archive
-
The full version of this paper will be posted on the Cryptology ePrint Archive, http://eprint.iacr.org/
-
Cryptology
-
-
-
2
-
-
77954625601
-
Efficient lattice (H)IBE in the standard model
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
3
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Berlekamp, E., McEliece, R., van Tilborg, H.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24(3), 384-386 (1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.1
McEliece, R.2
Van Tilborg, H.3
-
4
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Blum, A., Furst, M.L., Kearns, M.J., Lipton, R.J.: Cryptographic primitives based on hard learning problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.L.2
Kearns, M.J.3
Lipton, R.J.4
-
5
-
-
0033702346
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
ACM Press, New York May
-
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. In: 32nd ACM STOC, pp. 435-440. ACM Press, New York (May 2000)
-
(2000)
32nd ACM STOC
, pp. 435-440
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
6
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003)
-
(2003)
J. ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
7
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
79955534142
-
Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Boyen, X.: Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 499-517. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 499-517
-
-
Boyen, X.1
-
9
-
-
33845920117
-
++: A lightweight authentication protocol secure against some attacks
-
++: a lightweight authentication protocol secure against some attacks. In: SecPerU, pp. 28-33 (2006)
-
(2006)
SecPerU
, pp. 28-33
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
10
-
-
70350347974
-
On the amortized complexity of zero-knowledge protocols
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Cramer, R., Damgard, I.: On the amortized complexity of zero-knowledge protocols. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 177-191. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 177-191
-
-
Cramer, R.1
Damgard, I.2
-
11
-
-
70350615810
-
Securing HB+ against GRS man-in-the-middle attack
-
Duc, D.N., Kim, K.: Securing HB+ against GRS man-in-the-middle attack. In: SCIS (2007)
-
(2007)
SCIS
-
-
Duc, D.N.1
Kim, K.2
-
12
-
-
84947905764
-
An efficient pseudo-random generator provably as secure as syndrome decoding
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 245-255. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 245-255
-
-
Fischer, J.-B.1
Stern, J.2
-
13
-
-
78651316829
-
Faster integer multiplication
-
Fürer, M.: Faster integer multiplication. SIAM J. Comput. 39(3), 979-1005 (2009)
-
(2009)
SIAM J. Comput.
, vol.39
, Issue.3
, pp. 979-1005
-
-
Fürer, M.1
-
14
-
-
33144487342
-
An active attack against HB+ - A provably secure lightweight authentication protocol
-
ePrint Archive, Report 2005/237
-
Gilbert, H., Robshaw, M., Sibert, H.: An active attack against HB+ - a provably secure lightweight authentication protocol. Cryptology ePrint Archive, Report 2005/237 (2005), http://eprint.iacr.org/
-
(2005)
Cryptology
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
15
-
-
54249085502
-
Good variants of hB+ are hard to find
-
Tsudik, G. (ed.) FC 2008. Springer, Heidelberg
-
Gilbert, H., Robshaw, M.J.B., Seurin, Y.: Good variants of hB+ are hard to find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 156-170. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5143
, pp. 156-170
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
16
-
-
44449155290
-
+
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
+. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361-378. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
17
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM 33, 792-807 (1986)
-
(1986)
Journal of the ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
18
-
-
70349284581
-
Secure human identification protocols
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
19
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
20
-
-
33746104831
-
+ protocols
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
+ protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73-87. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
21
-
-
77954759293
-
Parallel and concurrent security of the HB and HB+ protocols
-
Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology 23(3), 402-421 (2010)
-
(2010)
Journal of Cryptology
, vol.23
, Issue.3
, pp. 402-421
-
-
Katz, J.1
Shin, J.S.2
Smith, A.3
-
22
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
Kearns, M.J.: Efficient noise-tolerant learning from statistical queries. J. ACM 45(6), 983-1006 (1998)
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.J.1
-
23
-
-
33749998666
-
An improved LPN algorithm
-
De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
-
Levieil, É., Fouque, P.-A.: An improved LPN algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348-359. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 348-359
-
-
Levieil, É.1
Fouque, P.-A.2
-
24
-
-
34247523203
-
HB-MP: A further step in the HB-family of lightweight authentication protocols
-
Munilla, J., Peinado, A.: HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks 51(9), 2262-2267 (2007)
-
(2007)
Computer Networks
, vol.51
, Issue.9
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
-
25
-
-
58349109583
-
On the security of hB# against a man-in-the-middle attack
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Ouafi, K., Overbeck, R., Vaudenay, S.: On the security of hB# against a man-in-the-middle attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 108-124. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 108-124
-
-
Ouafi, K.1
Overbeck, R.2
Vaudenay, S.3
-
26
-
-
79957989143
-
-
manuscript
-
Pietrzak, K.: Subspace LWE (2010) (manuscript) http://homepages.cwi.nl/ ~pietrzak/publications/SLWE.pdf
-
(2010)
Subspace LWE
-
-
Pietrzak, K.1
-
27
-
-
33745571012
-
On lattices, learning with errors
-
random linear codes, and cryptography. Gabow, H.N., Fagin, R. (eds.) ACM Press, New York
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) 37th ACM STOC, pp. 84-93. ACM Press, New York (2005)
-
(2005)
37th ACM STOC
, pp. 84-93
-
-
Regev, O.1
-
28
-
-
34250459760
-
Schnelle Multiplikation grosser Zahlen
-
Schönhage, A., Strassen, V.: Schnelle Multiplikation grosser Zahlen. Computing 7 (1971)
-
(1971)
Computing
, vol.7
-
-
Schönhage, A.1
Strassen, V.2
-
29
-
-
0012583238
-
-
PhD thesis, Monreal, P.Q., Canada, AAINQ35648
-
Van De Graaf, J.: Towards a formal definition of security for quantum protocols. PhD thesis, Monreal, P.Q., Canada, AAINQ35648 (1998)
-
(1998)
Towards A Formal Definition of Security for Quantum Protocols
-
-
Van De Graaf, J.1
-
30
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Waters, B.R.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.R.1
-
31
-
-
67650135522
-
Zero-knowledge against quantum attacks
-
Watrous, J.: Zero-knowledge against quantum attacks. SIAM J. Comput. 39(1), 25-58 (2009)
-
(2009)
SIAM J. Comput.
, vol.39
, Issue.1
, pp. 25-58
-
-
Watrous, J.1
|