Two-Round Man-in-the-Middle Security from LPN (Q2796127): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Created claim: DBLP publication ID (P1635): conf/tcc/CashKT16, #quickstatements; #temporary_batch_1731468600454
 
(4 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: HB-MP / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-49096-9_10 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2190257033 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate weak pseudorandom functions in AC <sup>0</sup> ○ MOD <sub>2</sub> / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Never Trust a Bunny / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noise-tolerant learning, the parity problem, and the statistical query model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Message Authentication, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: : Increasing the Security and Efficiency of / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Encrypt with the LPN Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lapin: An Efficient Authentication Protocol Based on Ring-LPN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474165 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticating Pervasive Devices with Human Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel and concurrent security of the HB and \(HB^{+}\) protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Authentication from Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Improved LPN Algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: HB-MP: a further step in the HB-family of lightweight authentication protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of HB# against a Man-in-the-Middle Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / DBLP publication ID
 
Property / DBLP publication ID: conf/tcc/CashKT16 / rank
 
Normal rank

Latest revision as of 05:05, 13 November 2024

scientific article
Language Label Description Also known as
English
Two-Round Man-in-the-Middle Security from LPN
scientific article

    Statements

    Two-Round Man-in-the-Middle Security from LPN (English)
    0 references
    0 references
    0 references
    0 references
    23 March 2016
    0 references
    secret-key authentication
    0 references
    man-in-the-middle security
    0 references
    LPN
    0 references
    field LPN
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers