## Found 39 Documents (Results 1–39)

100
MathJax

### Boolean ring cryptographic equation solving. (English)Zbl 1485.94110

Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 252-272 (2021).
Full Text:

### Towards efficient LPN-based symmetric encryption. (English)Zbl 07493510

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 208-230 (2021).
MSC:  94A60
Full Text:

### Noisy Simon period finding. (English)Zbl 1483.81044

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 75-99 (2021).
Full Text:

### Robustly reusable fuzzy extractor with imperfect randomness. (English)Zbl 1462.94034

MSC:  94A60 68P25
Full Text:

### Optimal merging in quantum $$k$$-xor and $$k$$-sum algorithms. (English)Zbl 1489.81021

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 311-340 (2020).
Full Text:

### Solving LPN using covering codes. (English)Zbl 1455.94161

MSC:  94A60 94B75
Full Text:

### A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement. (English)Zbl 1455.94154

Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 111-130 (2019).
MSC:  94A60
Full Text:

### Efficient public-key encryption scheme based on Ring-LPN. (Chinese. English summary)Zbl 1449.68028

MSC:  68P25 94A60
Full Text:

### A new birthday-type algorithm for attacking the fresh re-keying countermeasure. (English)Zbl 1481.94105

MSC:  94A60 68P25
Full Text:

### Simpler CCA secure PKE from LPN problem without double-trapdoor. (English)Zbl 1458.94224

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 756-766 (2018).
MSC:  94A60 81P94 68P25
Full Text:

### CCA secure multi-recipient KEM from LPN. (English)Zbl 1458.94223

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 513-529 (2018).
MSC:  94A60 81P94
Full Text:

### Secure outsourcing of cryptographic circuits. (English)Zbl 1421.94082

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 94-108 (2018).
MSC:  94A60 94A62
Full Text:

MSC:  94A60
Full Text:

### Decoding linear codes with high error rate and its impact for LPN security. (English)Zbl 1425.94077

Lange, Tanja (ed.) et al., Post-quantum cryptography. 9th international conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10786, 25-46 (2018).
MSC:  94B05 94B35
Full Text:

### On iterative collision search for LPN and subset sum. (English)Zbl 1416.68143

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017).
Full Text:

### LPN decoded. (English)Zbl 1410.94065

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 486-514 (2017).
MSC:  94A60
Full Text:

### KDM-secure public-key encryption from constant-noise LPN. (English)Zbl 1386.94073

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 44-64 (2017).
MSC:  94A60
Full Text:

### Faster algorithms for solving LPN. (English)Zbl 1347.94064

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 168-195 (2016).
MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### Enhancing side-channel analysis of binary-field multiplication with bit reliability. (English)Zbl 1334.94093

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 255-270 (2016).
MSC:  94A60
Full Text:

### Two-round man-in-the-middle security from LPN. (English)Zbl 1378.94074

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 225-248 (2016).
MSC:  94A62
Full Text:

### Cramer-Shoup like chosen ciphertext security from LPN. (English)Zbl 1403.94080

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 79-95 (2015).
MSC:  94A60
Full Text:

### Improved side-channel analysis of finite-field multiplication. (English)Zbl 1380.94073

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 395-415 (2015).
MSC:  94A60 68M07
Full Text:

### Key-recovery attacks on $$\mathsf {ASASA}$$. (English)Zbl 1375.94150

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 3-27 (2015).
MSC:  94A60
Full Text:

### Low noise LPN: KDM secure public key encryption and sample amplification. (English)Zbl 1345.94057

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 604-626 (2015).
MSC:  94A60
Full Text:

### On the complexity of the BKW algorithm on LWE. (English)Zbl 1331.94051

MSC:  94A60 68Q25 68Q17
Full Text:

### On the security proof of an authentication protocol from Eurocrypt 2011. (English)Zbl 1417.94094

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 187-203 (2014).
MSC:  94A62 68M12
Full Text:

### Solving LPN using covering codes. (English)Zbl 1306.94059

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 1-20 (2014).
MSC:  94A60 94B75
Full Text:

### Hardware implementation and side-channel analysis of Lapin. (English)Zbl 1337.94096

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 206-226 (2014).
MSC:  94A62
Full Text:

### Never trust a bunny. (English)Zbl 1337.94093

Hoepman, Jaap-Henk (ed.) et al., Radio frequency identification. Security and privacy issues. 8th international workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2–3, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36139-5/pbk). Lecture Notes in Computer Science 7739, 137-148 (2013).
MSC:  94A62
Full Text:

### Man-in-the-middle secure authentication schemes from LPN and weak PRFs. (English)Zbl 1316.94102

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 308-325 (2013).
MSC:  94A62
Full Text:

### Authentication protocols for reliable information provision systems with low computational-ability devices. (English)Zbl 1267.68028

MSC:  68M10 94A62 68P25

### Lapin: an efficient authentication protocol based on ring-LPN. (English)Zbl 1282.94078

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012).
MSC:  94A62 68P25
Full Text:

MSC:  94A60
Full Text:

### Good variants of HB$$^{ + }$$ are hard to find. (English)Zbl 1175.94079

Tsudik, Gene (ed.), Financial cryptography and data security. 12th international conference, FC 2008, Cozumel, Mexico, January 28–31, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-85229-2/pbk). Lecture Notes in Computer Science 5143, 156-170 (2008).
MSC:  94A60 94A62
Full Text:

### How to encrypt with the LPN problem. (English)Zbl 1155.94368

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 679-690 (2008).
MSC:  94A60 94A62
Full Text:

### HB$$^{\#}$$: Increasing the security and efficiency of HB$$^{+}$$. (English)Zbl 1149.94334

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 361-378 (2008).
MSC:  94A62
Full Text:

### An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. (English)Zbl 1175.94078

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 48-62 (2006).
MSC:  94A60 94A62
Full Text:

### Authenticating pervasive devices with human protocols. (English)Zbl 1145.94470

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 293-308 (2005).
MSC:  94A62
Full Text:

all top 5

all top 5

all top 3

all top 3