×

Found 14 Documents (Results 1–14)

Solving the learning parity with noise problem using quantum algorithms. (English) Zbl 1523.81049

Batina, Lejla (ed.) et al., Progress in cryptology – AFRICACRYPT 2022. 13th international conference on cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13503, 295-322 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Boolean ring cryptographic equation solving. (English) Zbl 1485.94110

Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 252-272 (2021).
PDFBibTeX XMLCite
Full Text: DOI

Towards efficient LPN-based symmetric encryption. (English) Zbl 1498.94056

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 208-230 (2021).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Simpler CCA secure PKE from LPN problem without double-trapdoor. (English) Zbl 1458.94224

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 756-766 (2018).
MSC:  94A60 81P94 68P25
PDFBibTeX XMLCite
Full Text: DOI

On iterative collision search for LPN and subset sum. (English) Zbl 1416.68143

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017).
PDFBibTeX XMLCite
Full Text: DOI

Improved side-channel analysis of finite-field multiplication. (English) Zbl 1380.94073

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 395-415 (2015).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI

On the security proof of an authentication protocol from Eurocrypt 2011. (English) Zbl 1417.94094

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 187-203 (2014).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Lapin: an efficient authentication protocol based on ring-LPN. (English) Zbl 1282.94078

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software