-
1
-
-
84916622116
-
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
-
Report 2012/197
-
Alekhnovich, M. Fossorier, M.P.C Mihaljevic, M.J., Imai, H, Cui, Y, Matsuura, K.: A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication. Cryptology ePrint archive, Report 2012/197 (2012), http://eprint.iacr.org/
-
(2012)
Cryptology ePrint archive
-
-
Alekhnovich, M.F.1
Mihaljevic, M.P.C.2
Imai, H.3
Cui, Y.4
Matsuura, K.5
-
2
-
-
44449155290
-
HB#: Increasing the Security and the Efficiency of HB+
-
In: Smart, N.P. (ed.), Springer, Heidelberg
-
Gilbert, H., Robshaw, M., Seurin, Y.: HB#: Increasing the Security and the Efficiency of HB+. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361–378. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008. LNCS
, vol.4965
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.2
Seurin, Y.3
-
3
-
-
49149109143
-
How to encrypt with the LPN problem
-
In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.), Springer, Heidelberg
-
Gilbert, H., Robshaw, M.J.B., Seurin, Y.: How to encrypt with the LPN problem. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 679–690. Springer, Heidelberg (2008)
-
(2008)
ICALP 2008, Part II. LNCS
, vol.5126
, pp. 679-690
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
4
-
-
33144487342
-
An active attack against HB+—a provably secure lightweight authentication protocol
-
Report 2005/237
-
Gilbert, H., Robshaw, M.J.B., Sibert, H.: An active attack against HB+—a provably secure lightweight authentication protocol. Cryptology ePrint Archive, Report 2005/237 (2005), http://eprint.iacr.org/
-
(2005)
Cryptology ePrint Archive
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Sibert, H.3
-
6
-
-
84866641858
-
Lapin: An Efficient Authentication Protocol Based on Ring-LPN
-
In: Canteaut, A. (ed.), Springer, Heidelberg
-
Heyse, S., Kiltz, E., Lyubashevsky, V., Paar, C., Pietrzak, K.: Lapin: An Efficient Authentication Protocol Based on Ring-LPN. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 346–365. Springer, Heidelberg (2012)
-
(2012)
FSE 2012. LNCS
, vol.7549
, pp. 346-365
-
-
Heyse, S.1
Kiltz, E.2
Lyubashevsky, V.3
Paar, C.4
Pietrzak, K.5
-
7
-
-
70349284581
-
Secure human identification protocols
-
In: Boyd, C. (ed.), Springer, Heidelberg
-
Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)
-
(2001)
ASIACRYPT 2001. LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
8
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
In: Shoup, V. (ed.), Springer, Heidelberg
-
Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
9
-
-
33746104831
-
Parallel and concurrent security of the HB and HB+ protocols
-
In: Vaudenay, S. (ed.), Springer, Heidelberg
-
Katz, J., Shin, J.S.: Parallel and concurrent security of the HB and HB+ protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73–87. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
10
-
-
77954759293
-
Parallel and concurrent security of the HB and HB+ protocols
-
Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology 23(3), 402–421 (2010)
-
(2010)
Journal of Cryptology
, vol.23
, Issue.3
, pp. 402-421
-
-
Katz, J.1
Shin, J.S.2
Smith, A.3
-
11
-
-
0032202014
-
Effcient Noise-Tolerant Learning from Statistical Queries
-
Kearns, M.: Effcient Noise-Tolerant Learning from Statistical Queries. J. ACM 45(6), 983–1006 (1998)
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
12
-
-
79957999442
-
Efficient Authentication from Hard Learning Problems
-
In: Paterson, K.G. (ed.), Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7–26. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 7-26
-
-
Kiltz, E.1
Pietrzak, K.2
Cash, D.3
Jain, A.4
Venturi, D.5
-
13
-
-
84866723385
-
Improved Generalized Birthday Attack
-
Report 2011/377
-
Kirchner, P.: Improved Generalized Birthday Attack. Cryptology ePrint Archive, Report 2011/377 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology ePrint Archive
-
-
Kirchner, P.1
-
14
-
-
84856209903
-
Memoryless near-collisions via coding theory. Designs
-
Lamberger, M., Mendel, F., Rijmen, V., Simoens, K.: Memoryless near-collisions via coding theory. Designs, Codes and Cryptography 62(1), 1–18 (2012)
-
(2012)
Codes and Cryptography
, vol.62
, Issue.1
, pp. 1-18
-
-
Lamberger, M.1
Mendel, F.2
Rijmen, V.3
Simoens, K.4
-
15
-
-
84870384671
-
Memoryless near-collisions, revisited
-
Lamberger, M., Teufl, E.: Memoryless near-collisions, revisited. Information Processing Letters 113(3), 60–66 (2013)
-
(2013)
Information Processing Letters
, vol.113
, Issue.3
, pp. 60-66
-
-
Lamberger, M.1
Teufl, E.2
-
16
-
-
33749998666
-
An Improved LPN Algorithm
-
In: De Prisco, R., Yung, M. (eds.), Springer, Heidelberg
-
Levieil, É., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348–359. Springer, Heidelberg (2006)
-
(2006)
SCN 2006. LNCS
, vol.4116
, pp. 348-359
-
-
Levieil, É.1
Fouque, P.-A.2
-
17
-
-
26944487960
-
The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem
-
In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.), Springer, Heidelberg
-
Lyubashevsky, V.: The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM 2005. LNCS, vol. 3624, pp. 378–389. Springer, Heidelberg (2005)
-
(2005)
APPROX 2005 and RANDOM 2005. LNCS
, vol.3624
, pp. 378-389
-
-
Lyubashevsky, V.1
-
19
-
-
34247523203
-
HB-MP: A further step in the HB-family of lightweight authentication protocols
-
Munilla, J., Peinado, A.: HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks 51(9), 2262–2267 (2007).
-
(2007)
Computer Networks
, vol.51
, Issue.9
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
-
20
-
-
33745571012
-
On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
-
Gabow, H.N., Fagin, R. (eds.)
-
Regev, O.: On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. In: Gabow, H.N., Fagin, R. (eds.) Proceedings of 37th Annual ACM Symposium on Theory of Computing, pp. 84–93 (2005)
-
(2005)
Proceedings of 37th Annual ACM Symposium on Theory of Computing
, pp. 84-93
-
-
Regev, O.1
-
21
-
-
84964937021
-
A Method for Finding Codewords of Small Weight
-
In: Wolfmann, J., Cohen, G. (eds.), Springer, Heidelberg
-
Stern, J.: A Method for Finding Codewords of Small Weight. In: Wolfmann, J., Cohen, G. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106–113. Springer, Heidelberg (1989)
-
(1989)
Coding Theory 1988. LNCS
, vol.388
, pp. 106-113
-
-
Stern, J.1
-
22
-
-
84955595109
-
A New Identification Scheme Based on Syndrome Decoding
-
In: Stinson, D.R. (ed.), Springer, Heidelberg
-
Stern, J.: A New Identification Scheme Based on Syndrome Decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13–21. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1993. LNCS
, vol.773
, pp. 13-21
-
-
Stern, J.1
-
23
-
-
84937428040
-
A Generalized Birthday Problem
-
In: Yung, M. (ed.), Springer, Heidelberg
-
Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288–304. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002. LNCS
, vol.2442
, pp. 288-304
-
-
Wagner, D.1
|