Two-Round Man-in-the-Middle Security from LPN (Q2796127): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Candidate weak pseudorandom functions in AC <sup>0</sup> ○ MOD <sub>2</sub> / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Never Trust a Bunny / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noise-tolerant learning, the parity problem, and the statistical query model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Message Authentication, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: : Increasing the Security and Efficiency of / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Encrypt with the LPN Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lapin: An Efficient Authentication Protocol Based on Ring-LPN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474165 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticating Pervasive Devices with Human Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel and concurrent security of the HB and \(HB^{+}\) protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Authentication from Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Improved LPN Algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: HB-MP: a further step in the HB-family of lightweight authentication protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of HB# against a Man-in-the-Middle Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank

Revision as of 15:50, 11 July 2024

scientific article
Language Label Description Also known as
English
Two-Round Man-in-the-Middle Security from LPN
scientific article

    Statements

    Two-Round Man-in-the-Middle Security from LPN (English)
    0 references
    0 references
    0 references
    0 references
    23 March 2016
    0 references
    secret-key authentication
    0 references
    man-in-the-middle security
    0 references
    LPN
    0 references
    field LPN
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers