메뉴 건너뛰기




Volumn 4329 LNCS, Issue , 2006, Pages 48-62

An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication

Author keywords

Cryptanalysis; Fast correlation attacks; HB protocols; LPN problem; RFID authentication

Indexed keywords

AUTHENTICATION; CHROMIUM COMPOUNDS; CRYPTOGRAPHY;

EID: 84998808084     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11941378_5     Document Type: Conference Paper
Times cited : (34)

References (20)
  • 1
    • 0017973512 scopus 로고
    • On the Inherent Intractability of Certain Coding Problems”, IEEE Trans
    • E.R. Berlekamp, R.J. McEliece, and H.C.A. van Tilborg, “On the Inherent Intractability of Certain Coding Problems”, IEEE Trans. Info. Theory, vol. 24, pp. 384-386, 1978.
    • (1978) Info. Theory , vol.24 , pp. 384-386
    • Berlekamp, E.R.1    McEliece, R.J.2    Van Tilborg, H.C.A.3
  • 3
    • 24144453496 scopus 로고    scopus 로고
    • Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model
    • A. Blum, A. Kalai and H. Wasserman, “Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model”, Journal of the ACM, vol. 50, no. 4, pp. 506-519, July 2003.
    • (2003) Journal of the ACM , vol.50 July , Issue.4 , pp. 506-519
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 4
    • 84948963042 scopus 로고
    • On the Security of Some Cryptosystems Based on Error-Correcting Codes
    • F. Chabaud, “On the Security of Some Cryptosystems Based on Error-Correcting Codes. EUROCRYT ’94, Lecture Notes in Computer Science, vol. 950, pp. 113-139, 1995.
    • (1995) EUROCRYT ’94, Lecture Notes in Computer Science , vol.950 , pp. 113-139
    • Chabaud, F.1
  • 7
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback”
    • vol
    • N.T. Courtois, “Fast algebraic attacks on stream ciphers with linear feedback”, CRYPTO’2003, Lecture Notes in Computer Science, vol. 2729, pp. 176-194, 2003.
    • (2003) CRYPTO’2003, Lecture Notes in Computer Science , vol.2729 , pp. 176-194
    • Courtois, N.T.1
  • 9
    • 33144487342 scopus 로고    scopus 로고
    • An Active Attack against HB+ a Provably Secure Lightweight Authentication Protocol
    • Report 2005/237, July , Available at
    • H. Gilbert, M. Robshaw and H. Sibert, “An Active Attack against HB+ a Provably Secure Lightweight Authentication Protocol”, IACR, Cryptology ePrint Archive, Report 2005/237, July 2005. Available at http://eprint.iacr.org/2005/237.
    • (2005) IACR, Cryptology Eprint Archive
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 11
    • 35048843339 scopus 로고    scopus 로고
    • Rewriting variables: The complexity of fast algebraic attacks on stream ciphers”, CRYPTO 2004
    • P. Hawkes and G. Rose, “Rewriting variables: the complexity of fast algebraic attacks on stream ciphers”, CRYPTO 2004, Lecture Notes in Computer Science, vol. 3159, pp. 390-406, Aug. 2004.
    • (2004) Lecture Notes in Computer Science , vol.3159 Aug , pp. 390-406
    • Hawkes, P.1    Rose, G.2
  • 12
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Proto-cols
    • Updated version available at
    • A. Juels and S. Weis, “Authenticating Pervasive Devices with Human Proto-cols”, CRYPTO2005, Lecture Notes in Computer Science, vol. 3621, pp. 293-308, 2005. Updated version available at: http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/pdfs/lpn.pdf
    • (2005) CRYPTO2005, Lecture Notes in Computer Science , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 13
    • 33746104831 scopus 로고    scopus 로고
    • Parallel and Concurrent Security of the HB and HB+ Protocols”, EUROCRYPT2006
    • J. Katz and J.S. Shin, “Parallel and Concurrent Security of the HB and HB+ Protocols”, EUROCRYPT2006, Lecture Notes in Computer Science, vol. 4004, pp. 73-87, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.S.2
  • 15
    • 0024860262 scopus 로고
    • Fast Correlation Attacks on Certain Stream Ci-phers
    • W. Meier and O. Staffelbach, “Fast Correlation Attacks on Certain Stream Ci-phers,” Journal of Cryptology, vol. 1, pp. 159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 16
    • 33745666500 scopus 로고    scopus 로고
    • “A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation”
    • M.J. Mihaljević, M.P.C. Fossorier and H. Imai, “A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation”, AAECC2006, Lecture Notes in Computer Science, vol. 3857, pp. 203-214, 2006.
    • (2006) AAECC2006, Lecture Notes in Computer Science , vol.3857 , pp. 203-214
    • Mihaljević, M.J.1    Fossorier, M.P.C.2    Imai, H.3
  • 18
    • 33745571012 scopus 로고    scopus 로고
    • On Lattices, Learning with Errors, Random Linear Codes, and Cryp-tography
    • O. Regev, “On Lattices, Learning with Errors, Random Linear Codes, and Cryp-tography”, 37th ACM Symposium on Theory of Computing, Proceedings, pp. 84-93, 2005.
    • (2005) 37Th ACM Symposium on Theory of Computing, Proceedings , pp. 84-93
    • Regev, O.1
  • 19
    • 0021786321 scopus 로고
    • Decrypting a Class of Stream Ciphers Using Ciphertext Only
    • T. Siegenthaler, “Decrypting a Class of Stream Ciphers Using Ciphertext Only,” IEEE Trans. Comput., vol. C-34, pp. 81-85, 1985.
    • (1985) IEEE Trans. Comput. , vol.34 , pp. 81-85
    • Siegenthaler, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.