×

Found 39 Documents (Results 1–39)

100
MathJax

Boolean ring cryptographic equation solving. (English) Zbl 1485.94110

Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 252-272 (2021).
PDF BibTeX XML Cite
Full Text: DOI

Towards efficient LPN-based symmetric encryption. (English) Zbl 07493510

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 208-230 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Noisy Simon period finding. (English) Zbl 1483.81044

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 75-99 (2021).
PDF BibTeX XML Cite
Full Text: DOI arXiv

Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms. (English) Zbl 1489.81021

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 311-340 (2020).
PDF BibTeX XML Cite
Full Text: DOI

A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement. (English) Zbl 1455.94154

Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 111-130 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Simpler CCA secure PKE from LPN problem without double-trapdoor. (English) Zbl 1458.94224

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 756-766 (2018).
MSC:  94A60 81P94 68P25
PDF BibTeX XML Cite
Full Text: DOI

CCA secure multi-recipient KEM from LPN. (English) Zbl 1458.94223

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 513-529 (2018).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Decoding linear codes with high error rate and its impact for LPN security. (English) Zbl 1425.94077

Lange, Tanja (ed.) et al., Post-quantum cryptography. 9th international conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10786, 25-46 (2018).
MSC:  94B05 94B35
PDF BibTeX XML Cite
Full Text: DOI

On iterative collision search for LPN and subset sum. (English) Zbl 1416.68143

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017).
PDF BibTeX XML Cite
Full Text: DOI

LPN decoded. (English) Zbl 1410.94065

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 486-514 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

KDM-secure public-key encryption from constant-noise LPN. (English) Zbl 1386.94073

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 44-64 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Faster algorithms for solving LPN. (English) Zbl 1347.94064

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 168-195 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Enhancing side-channel analysis of binary-field multiplication with bit reliability. (English) Zbl 1334.94093

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 255-270 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Two-round man-in-the-middle security from LPN. (English) Zbl 1378.94074

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 225-248 (2016).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI Link

Cramer-Shoup like chosen ciphertext security from LPN. (English) Zbl 1403.94080

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 79-95 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Improved side-channel analysis of finite-field multiplication. (English) Zbl 1380.94073

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 395-415 (2015).
MSC:  94A60 68M07
PDF BibTeX XML Cite
Full Text: DOI

Key-recovery attacks on \(\mathsf {ASASA}\). (English) Zbl 1375.94150

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 3-27 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Low noise LPN: KDM secure public key encryption and sample amplification. (English) Zbl 1345.94057

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 604-626 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On the security proof of an authentication protocol from Eurocrypt 2011. (English) Zbl 1417.94094

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 187-203 (2014).
MSC:  94A62 68M12
PDF BibTeX XML Cite
Full Text: DOI

Solving LPN using covering codes. (English) Zbl 1306.94059

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 1-20 (2014).
MSC:  94A60 94B75
PDF BibTeX XML Cite
Full Text: DOI Link

Hardware implementation and side-channel analysis of Lapin. (English) Zbl 1337.94096

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 206-226 (2014).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI Link

Never trust a bunny. (English) Zbl 1337.94093

Hoepman, Jaap-Henk (ed.) et al., Radio frequency identification. Security and privacy issues. 8th international workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2–3, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36139-5/pbk). Lecture Notes in Computer Science 7739, 137-148 (2013).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

Man-in-the-middle secure authentication schemes from LPN and weak PRFs. (English) Zbl 1316.94102

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 308-325 (2013).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

Lapin: an efficient authentication protocol based on ring-LPN. (English) Zbl 1282.94078

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Good variants of HB\(^{ + }\) are hard to find. (English) Zbl 1175.94079

Tsudik, Gene (ed.), Financial cryptography and data security. 12th international conference, FC 2008, Cozumel, Mexico, January 28–31, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-85229-2/pbk). Lecture Notes in Computer Science 5143, 156-170 (2008).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

How to encrypt with the LPN problem. (English) Zbl 1155.94368

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 679-690 (2008).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

HB\(^{\#}\): Increasing the security and efficiency of HB\(^{+}\). (English) Zbl 1149.94334

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 361-378 (2008).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. (English) Zbl 1175.94078

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 48-62 (2006).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Authenticating pervasive devices with human protocols. (English) Zbl 1145.94470

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 293-308 (2005).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Classification

all top 3

Software