-
1
-
-
70350342511
-
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
2
-
-
84889899231
-
-
Atmel, ATmega163 datasheet, www.atmel.com/atmel/acrobat/doc1142.pdf
-
ATmega163 Datasheet
-
-
-
3
-
-
84877639283
-
Cryptographic Primitives Based on Hard Learning Problems
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Blum, A., Furst, M.L., Kearns, M., Lipton, R.J.: Cryptographic Primitives Based on Hard Learning Problems. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 278-291. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.L.2
Kearns, M.3
Lipton, R.J.4
-
4
-
-
37149045263
-
PRESENT: An Ultra-Lightweight Block Cipher
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
5
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. J. ACM 50(4), 506-519 (2003)
-
(2003)
J. ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
6
-
-
84859941399
-
Message Authentication, Revisited
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Dodis, Y., Kiltz, E., Pietrzak, K., Wichs, D.: Message Authentication, Revisited. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 355-374. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 355-374
-
-
Dodis, Y.1
Kiltz, E.2
Pietrzak, K.3
Wichs, D.4
-
8
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
9
-
-
33144487342
-
An active attack against HB+ - A provably secure lightweight authentication protocol
-
Report 2005/237
-
Gilbert, H., Robshaw, M., Sibert, H.: An active attack against HB+ - a provably secure lightweight authentication protocol, Cryptology ePrint Archive, Report 2005/237 (2005), http://eprint.iacr.org/
-
(2005)
Cryptology ePrint Archive
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
10
-
-
44449155290
-
+
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
+. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361-378. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
11
-
-
49149109143
-
How to Encrypt with the LPN Problem
-
Aceto, L., Damgard, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Gilbert, H., Robshaw, M., Seurin, Y.: How to Encrypt with the LPN Problem. In: Aceto, L., Damgard, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 679-690. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 679-690
-
-
Gilbert, H.1
Robshaw, M.2
Seurin, Y.3
-
13
-
-
70349284581
-
Secure Human Identification Protocols
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
14
-
-
84889947383
-
-
Personal communication
-
Hanrot, G., Lyubashevsky, V., Peikert, C., Stehlé, D.: Personal communication (2011)
-
(2011)
-
-
Hanrot, G.1
Lyubashevsky, V.2
Peikert, C.3
Stehlé, D.4
-
15
-
-
11244267013
-
-
Springer-Verlag New York, Inc., Secaucus
-
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to elliptic curve cryptography. Springer-Verlag New York, Inc., Secaucus (2003)
-
(2003)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.J.2
Vanstone, S.3
-
16
-
-
33745181952
-
Authenticating Pervasive Devices with Human Protocols
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
17
-
-
84866723385
-
Improved generalized birthday attack
-
Report 2011/377
-
Kirchner, P.: Improved generalized birthday attack. Cryptology ePrint Archive, Report 2011/377 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology ePrint Archive
-
-
Kirchner, P.1
-
18
-
-
79957999442
-
Efficient authentication from hard learning problems
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient authentication from hard learning problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7-26. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 7-26
-
-
Kiltz, E.1
Pietrzak, K.2
Cash, D.3
Jain, A.4
Venturi, D.5
-
19
-
-
33746104831
-
+ Protocols
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
+ Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73-87. Springer, Heidelberg (2006).
-
(2006)
LNCS
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
20
-
-
36448933755
-
Analyzing the HB and HB+ protocols in the "large error" case
-
Report 2006/326
-
Katz, J., Smith, A.: Analyzing the HB and HB+ protocols in the "large error" case. Cryptology ePrint Archive, Report 2006/326 (2006), http://eprint.iacr.org/
-
(2006)
Cryptology ePrint Archive
-
-
Katz, J.1
Smith, A.2
-
21
-
-
77954759293
-
Parallel and concurrent security of the HB and HB+ protocols
-
Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology 23(3), 402-421 (2010)
-
(2010)
Journal of Cryptology
, vol.23
, Issue.3
, pp. 402-421
-
-
Katz, J.1
Shin, J.S.2
Smith, A.3
-
24
-
-
84866723388
-
-
Personal communication
-
Lange, T.: Personal communication (2012)
-
(2012)
-
-
Lange, T.1
-
25
-
-
33749998666
-
An Improved LPN Algorithm
-
De Prisco, R., Yung, M. (eds.) SCN 2006. Springer, Heidelberg
-
Levieil, É., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348-359. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 348-359
-
-
Levieil, É.1
Fouque, P.-A.2
-
26
-
-
84866718342
-
AES implementation and performance evaluation on 8-bit microcontrollers
-
abs/0911.0482
-
Lee, H., Lee, K., Shin, Y.: AES implementation and performance evaluation on 8-bit microcontrollers. CoRR abs/0911.0482 (2009)
-
(2009)
CoRR
-
-
Lee, H.1
Lee, K.2
Shin, Y.3
-
27
-
-
77954639468
-
On Ideal Lattices and Learning with Errors over Rings
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
28
-
-
26944487960
-
The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem
-
Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM 2005. Springer, Heidelberg
-
Lyubashevsky, V.: The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM 2005. LNCS, vol. 3624, pp. 378-389. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3624
, pp. 378-389
-
-
Lyubashevsky, V.1
-
30
-
-
58349109583
-
# against a Man-in-the-Middle Attack
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
# against a Man-in-the-Middle Attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 108-124. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 108-124
-
-
Ouafi, K.1
Overbeck, R.2
Vaudenay, S.3
-
32
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6) (2009)
-
(2009)
J. ACM
, vol.56
, Issue.6
-
-
Regev, O.1
-
34
-
-
84889911767
-
-
WISP Wiki, WISP 4.0 DL hardware, http://wisp.wikispaces.com/WISP+4.0+DL
-
WISP 4.0 DL Hardware
-
-
|