×

Found 11 Documents (Results 1–11)

100
MathJax

Towards efficient LPN-based symmetric encryption. (English) Zbl 07493510

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 208-230 (2021).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

On iterative collision search for LPN and subset sum. (English) Zbl 1416.68143

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017).
PDF BibTeX XML Cite
Full Text: DOI

KDM-secure public-key encryption from constant-noise LPN. (English) Zbl 1386.94073

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 44-64 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Faster algorithms for solving LPN. (English) Zbl 1347.94064

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 168-195 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Enhancing side-channel analysis of binary-field multiplication with bit reliability. (English) Zbl 1334.94093

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 255-270 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Solving LPN using covering codes. (English) Zbl 1306.94059

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 1-20 (2014).
MSC:  94A60 94B75
PDF BibTeX XML Cite
Full Text: DOI Link

Man-in-the-middle secure authentication schemes from LPN and weak PRFs. (English) Zbl 1316.94102

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 308-325 (2013).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

Authenticating pervasive devices with human protocols. (English) Zbl 1145.94470

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 293-308 (2005).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Year of Publication

Classification

all top 3

Software