Pages that link to "Item:Q5458265"
From MaRDI portal
The following pages link to An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication (Q5458265):
Displaying 11 items.
- On solving LPN using BKW and variants, Implementation and analysis (Q276557) (← links)
- A survey on fast correlation attacks (Q2376656) (← links)
- An approach for stream ciphers design based on joint computing over random and secret data (Q2390944) (← links)
- Solving the learning parity with noise's open question (Q2444770) (← links)
- Optimization of $$\mathsf {LPN}$$ Solving Algorithms (Q2958144) (← links)
- Fast Correlation Attacks: Methods and Countermeasures (Q3013077) (← links)
- How to Encrypt with the LPN Problem (Q3519542) (← links)
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags (Q3525666) (← links)
- Good Variants of HB + Are Hard to Find (Q3603007) (← links)
- : Increasing the Security and Efficiency of (Q5458602) (← links)
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols (Q5962225) (← links)