-
1
-
-
0017973512
-
On the Inherent Intractability of Certain Coding Problems”, IEEE Trans
-
E.R. Berlekamp, R.J. McEliece, and H.C.A. van Tilborg, “On the Inherent Intractability of Certain Coding Problems”, IEEE Trans. Info. Theory, vol. 24, pp. 384-386, 1978.
-
(1978)
Info. Theory
, vol.24
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
Van Tilborg, H.C.A.3
-
2
-
-
84877639283
-
Cryptographic Primitives Based on Hard Learning Problems”
-
vol
-
A. Blum, M. Furst, M. Kearns, and R. Lipton, “Cryptographic Primitives Based on Hard Learning Problems”, CRYPTO ’93, Lecture Notes in Computer Science, vol. 773, pp. 278-291, 1994.
-
(1994)
CRYPTO ’93, Lecture Notes in Computer Science
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.4
-
3
-
-
24144453496
-
Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model
-
A. Blum, A. Kalai and H. Wasserman, “Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model”, Journal of the ACM, vol. 50, no. 4, pp. 506-519, July 2003.
-
(2003)
Journal of the ACM
, vol.50 July
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
4
-
-
84948963042
-
On the Security of Some Cryptosystems Based on Error-Correcting Codes
-
F. Chabaud, “On the Security of Some Cryptosystems Based on Error-Correcting Codes. EUROCRYT ’94, Lecture Notes in Computer Science, vol. 950, pp. 113-139, 1995.
-
(1995)
EUROCRYT ’94, Lecture Notes in Computer Science
, vol.950
, pp. 113-139
-
-
Chabaud, F.1
-
5
-
-
84888039254
-
Fast Correlation Attacks: An Algorithmic Point of View”
-
P. Chose, A. Joux and M. Mitton, “Fast Correlation Attacks: An Algorithmic Point of View”, EUROCRYPT2002, Lecture Notes in Computer Science, vol. 2332, pp. 209-221, 2002.
-
(2002)
EUROCRYPT2002, Lecture Notes in Computer Science
, vol.2332
, pp. 209-221
-
-
Chose, P.1
Joux, A.2
Mitton, M.3
-
6
-
-
35248820612
-
Algebraic attacks on stream ciphers with linear feedback”
-
N.T. Courtois and W. Meier, “Algebraic attacks on stream ciphers with linear feedback”, EUROCRYPT’2003, Lecture Notes in Computer Science, vol. 2656, pp. 345-359, 2003.
-
(2003)
EUROCRYPT’2003, Lecture Notes in Computer Science
, vol.2656
, pp. 345-359
-
-
Courtois, N.T.1
Meier, W.2
-
7
-
-
35248849880
-
Fast algebraic attacks on stream ciphers with linear feedback”
-
vol
-
N.T. Courtois, “Fast algebraic attacks on stream ciphers with linear feedback”, CRYPTO’2003, Lecture Notes in Computer Science, vol. 2729, pp. 176-194, 2003.
-
(2003)
CRYPTO’2003, Lecture Notes in Computer Science
, vol.2729
, pp. 176-194
-
-
Courtois, N.T.1
-
8
-
-
33749436577
-
A Unified Analysis for the Fast Correlation Attack
-
ISBN 0-7803-9151-9
-
M.P.C. Fossorier, M.J. Mihaljević and H. Imai, “A Unified Analysis for the Fast Correlation Attack”, 2005 IEEE Int. Symp. Inform. Theory - ISIT’2005, Adelaide, Australia, Sept. 2005, Proceedings, pp. 2012-2015 (ISBN 0-7803-9151-9).
-
2005 IEEE Int. Symp. Inform. Theory - ISIT’2005, Adelaide, Australia, Sept. 2005, Proceedings
, pp. 2012-2015
-
-
Fossorier, M.P.C.1
Mihaljević, M.J.2
Imai, H.3
-
9
-
-
33144487342
-
An Active Attack against HB+ a Provably Secure Lightweight Authentication Protocol
-
Report 2005/237, July , Available at
-
H. Gilbert, M. Robshaw and H. Sibert, “An Active Attack against HB+ a Provably Secure Lightweight Authentication Protocol”, IACR, Cryptology ePrint Archive, Report 2005/237, July 2005. Available at http://eprint.iacr.org/2005/237.
-
(2005)
IACR, Cryptology Eprint Archive
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
10
-
-
70349284581
-
Secure Human Identification Protocols”
-
N. Hopper and M. Blum, “Secure Human Identification Protocols”, ASIACRYPT 2001, Lecture Notes in Computer Science, vol. 2248, pp. 52-66, 2001.
-
(2001)
ASIACRYPT 2001, Lecture Notes in Computer Science
, vol.2248
, pp. 52-66
-
-
Hopper, N.1
Blum, M.2
-
11
-
-
35048843339
-
Rewriting variables: The complexity of fast algebraic attacks on stream ciphers”, CRYPTO 2004
-
P. Hawkes and G. Rose, “Rewriting variables: the complexity of fast algebraic attacks on stream ciphers”, CRYPTO 2004, Lecture Notes in Computer Science, vol. 3159, pp. 390-406, Aug. 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3159 Aug
, pp. 390-406
-
-
Hawkes, P.1
Rose, G.2
-
12
-
-
33745181952
-
Authenticating Pervasive Devices with Human Proto-cols
-
Updated version available at
-
A. Juels and S. Weis, “Authenticating Pervasive Devices with Human Proto-cols”, CRYPTO2005, Lecture Notes in Computer Science, vol. 3621, pp. 293-308, 2005. Updated version available at: http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/pdfs/lpn.pdf
-
(2005)
CRYPTO2005, Lecture Notes in Computer Science
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
13
-
-
33746104831
-
Parallel and Concurrent Security of the HB and HB+ Protocols”, EUROCRYPT2006
-
J. Katz and J.S. Shin, “Parallel and Concurrent Security of the HB and HB+ Protocols”, EUROCRYPT2006, Lecture Notes in Computer Science, vol. 4004, pp. 73-87, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
14
-
-
33746593249
-
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions”
-
K. Khoo, G. Gong and H.-K. Lee, “The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions”, Applied Cryptography and Network Security - ACNS 2006, Lecture Notes in Computer Science, vol. 3989, pp. 194-209, 2006.
-
(2006)
Applied Cryptography and Network Security - ACNS 2006, Lecture Notes in Computer Science
, vol.3989
, pp. 194-209
-
-
Khoo, K.1
Gong, G.2
Lee, H.-K.3
-
15
-
-
0024860262
-
Fast Correlation Attacks on Certain Stream Ci-phers
-
W. Meier and O. Staffelbach, “Fast Correlation Attacks on Certain Stream Ci-phers,” Journal of Cryptology, vol. 1, pp. 159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
16
-
-
33745666500
-
“A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation”
-
M.J. Mihaljević, M.P.C. Fossorier and H. Imai, “A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation”, AAECC2006, Lecture Notes in Computer Science, vol. 3857, pp. 203-214, 2006.
-
(2006)
AAECC2006, Lecture Notes in Computer Science
, vol.3857
, pp. 203-214
-
-
Mihaljević, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
17
-
-
84958981368
-
Fast Correlation Attack Algorithm with List Decoding and an Application”
-
M.J. Mihaljević, M.P.C. Fossorier and H. Imai, “Fast Correlation Attack Algorithm with List Decoding and an Application”, FSE2001, Lecture Notes in Computer Science, vol. 2355, pp. 196-210, 2002.
-
(2002)
FSE2001, Lecture Notes in Computer Science, Vol
, vol.2355
, pp. 196-210
-
-
Mihaljević, M.J.1
Fossorier, M.P.C.2
Imai, H.3
-
18
-
-
33745571012
-
On Lattices, Learning with Errors, Random Linear Codes, and Cryp-tography
-
O. Regev, “On Lattices, Learning with Errors, Random Linear Codes, and Cryp-tography”, 37th ACM Symposium on Theory of Computing, Proceedings, pp. 84-93, 2005.
-
(2005)
37Th ACM Symposium on Theory of Computing, Proceedings
, pp. 84-93
-
-
Regev, O.1
-
19
-
-
0021786321
-
Decrypting a Class of Stream Ciphers Using Ciphertext Only
-
T. Siegenthaler, “Decrypting a Class of Stream Ciphers Using Ciphertext Only,” IEEE Trans. Comput., vol. C-34, pp. 81-85, 1985.
-
(1985)
IEEE Trans. Comput.
, vol.34
, pp. 81-85
-
-
Siegenthaler, T.1
-
20
-
-
84937428040
-
A Generalized Birthday Problem
-
D. Wagner, “A Generalized Birthday Problem,” CRYPTO ’02, Lecture Notes in Computer Science, vol. 2442, pp. 288-304, 2002.
-
(2002)
CRYPTO ’02, Lecture Notes in Computer Science
, vol.2442
, pp. 288-304
-
-
Wagner, D.1
|