Tran, Bénédikt; Vaudenay, Serge Solving the learning parity with noise problem using quantum algorithms. (English) Zbl 1523.81049 Batina, Lejla (ed.) et al., Progress in cryptology – AFRICACRYPT 2022. 13th international conference on cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13503, 295-322 (2022). MSC: 81P68 68T05 03C10 28C20 94A60 81P94 15B34 68P10 81P73 PDFBibTeX XMLCite \textit{B. Tran} and \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 13503, 295--322 (2022; Zbl 1523.81049) Full Text: DOI
Murphy, Sean; Paterson, Maura; Swart, Christine Boolean ring cryptographic equation solving. (English) Zbl 1485.94110 Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 252-272 (2021). MSC: 94A60 16P70 13P10 68Q17 PDFBibTeX XMLCite \textit{S. Murphy} et al., Lect. Notes Comput. Sci. 12804, 252--272 (2021; Zbl 1485.94110) Full Text: DOI
Bogos, Sonia; Korolija, Dario; Locher, Thomas; Vaudenay, Serge Towards efficient LPN-based symmetric encryption. (English) Zbl 1498.94056 Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 208-230 (2021). Reviewer: Zlatko Varbanov (Veliko Tarnovo) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Bogos} et al., Lect. Notes Comput. Sci. 12727, 208--230 (2021; Zbl 1498.94056) Full Text: DOI Link
May, Alexander; Schlieper, Lars; Schwinger, Jonathan Noisy Simon period finding. (English) Zbl 1483.81044 Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 75-99 (2021). MSC: 81P68 81P73 94A60 68M15 60H40 PDFBibTeX XMLCite \textit{A. May} et al., Lect. Notes Comput. Sci. 12704, 75--99 (2021; Zbl 1483.81044) Full Text: DOI arXiv
Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian Robustly reusable fuzzy extractor with imperfect randomness. (English) Zbl 1462.94034 Des. Codes Cryptography 89, No. 5, 1017-1059 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. Cui} et al., Des. Codes Cryptography 89, No. 5, 1017--1059 (2021; Zbl 1462.94034) Full Text: DOI
Ai, Zhijuan; Ma, Changshe; Xu, Bixia Efficient public-key encryption scheme based on Ring-LPN. (Chinese. English summary) Zbl 1449.68028 J. South China Norm. Univ., Nat. Sci. Ed. 51, No. 3, 116-122 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Z. Ai} et al., J. South China Norm. Univ., Nat. Sci. Ed. 51, No. 3, 116--122 (2019; Zbl 1449.68028) Full Text: DOI
Guo, Qian; Johansson, Thomas A new birthday-type algorithm for attacking the fresh re-keying countermeasure. (English) Zbl 1481.94105 Inf. Process. Lett. 146, 30-34 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Q. Guo} and \textit{T. Johansson}, Inf. Process. Lett. 146, 30--34 (2019; Zbl 1481.94105) Full Text: DOI
Cheng, Haitao; Li, Xiangxue; Qian, Haifeng; Yan, Di Simpler CCA secure PKE from LPN problem without double-trapdoor. (English) Zbl 1458.94224 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 756-766 (2018). MSC: 94A60 81P94 68P25 PDFBibTeX XMLCite \textit{H. Cheng} et al., Lect. Notes Comput. Sci. 11149, 756--766 (2018; Zbl 1458.94224) Full Text: DOI
Devadas, Srinivas; Ren, Ling; Xiao, Hanshen On iterative collision search for LPN and subset sum. (English) Zbl 1416.68143 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017). MSC: 68T05 68T20 68W40 94A60 PDFBibTeX XMLCite \textit{S. Devadas} et al., Lect. Notes Comput. Sci. 10678, 729--746 (2017; Zbl 1416.68143) Full Text: DOI
Belaïd, Sonia; Coron, Jean-Sébastien; Fouque, Pierre-Alain; Gérard, Benoît; Kammerer, Jean-Gabriel; Prouff, Emmanuel Improved side-channel analysis of finite-field multiplication. (English) Zbl 1380.94073 Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 395-415 (2015). MSC: 94A60 68M07 PDFBibTeX XMLCite \textit{S. Belaïd} et al., Lect. Notes Comput. Sci. 9293, 395--415 (2015; Zbl 1380.94073) Full Text: DOI
Albrecht, Martin R.; Cid, Carlos; Faugère, Jean-Charles; Fitzpatrick, Robert; Perret, Ludovic On the complexity of the BKW algorithm on LWE. (English) Zbl 1331.94051 Des. Codes Cryptography 74, No. 2, 325-354 (2015). MSC: 94A60 68Q25 68Q17 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Des. Codes Cryptography 74, No. 2, 325--354 (2015; Zbl 1331.94051) Full Text: DOI
Endo, Kosei; Kunihiro, Noboru On the security proof of an authentication protocol from Eurocrypt 2011. (English) Zbl 1417.94094 Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 187-203 (2014). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{K. Endo} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 8639, 187--203 (2014; Zbl 1417.94094) Full Text: DOI
Chang, Ya-Fen; Tai, Wei-Liang; Chen, Chia-Chen Authentication protocols for reliable information provision systems with low computational-ability devices. (English) Zbl 1267.68028 Informatica, Vilnius 24, No. 1, 1-12 (2013). MSC: 68M10 94A62 68P25 PDFBibTeX XMLCite \textit{Y.-F. Chang} et al., Informatica, Vilnius 24, No. 1, 1--12 (2013; Zbl 1267.68028)
Heyse, Stefan; Kiltz, Eike; Lyubashevsky, Vadim; Paar, Christof; Pietrzak, Krzysztof Lapin: an efficient authentication protocol based on ring-LPN. (English) Zbl 1282.94078 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{S. Heyse} et al., Lect. Notes Comput. Sci. 7549, 346--365 (2012; Zbl 1282.94078) Full Text: DOI