scientific article; zbMATH DE number 1024063

From MaRDI portal
Revision as of 22:00, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4341754

zbMath0870.94021MaRDI QIDQ4341754

Michael Kearns, Richard J. Lipton, Merrick L. Furst, Avrim L. Blum

Publication date: 17 September 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.





Related Items (70)

On solving LPN using BKW and variants, Implementation and analysisSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNSilver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codesCryptography from Learning Parity with NoiseExploring crypto dark matter: new simple PRF candidates and their applicationsLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Garbling XOR gates ``for free in the standard modelFast Pseudorandom Functions Based on Expander GraphsBloom Filters in Adversarial EnvironmentsMaking the BKW algorithm practical for LWEAn approach for stream ciphers design based on joint computing over random and secret dataIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)On the nonlinearity of monotone Boolean functionsPermuted puzzles and cryptographic hardnessFHEW with Efficient Multibit BootstrappingActively secure half-gates with minimum overhead under duplex networksSublinear-communication secure multiparty computation does not require FHEHomomorphic encryption: a mathematical surveyA non-heuristic approach to time-space tradeoffs and optimizations for BKWComputational wiretap coding from indistinguishability obfuscationMultikey Fully Homomorphic Encryption and ApplicationsModeling and simulating the sample complexity of solving LWE using BKW-style algorithmsCorrelated pseudorandomness from expand-accumulate codesStatistically sender-private OT from LPN and derandomizationMoz\(\mathbb{Z}_{2^k}\)arella: efficient vector-OLE and zero-knowledge proofs over \(\mathbb{Z}_{2^k}\)Efficient authentication from hard learning problemsExpand-convolute codes for pseudorandom correlation generators from LPNIndistinguishability obfuscationComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)How to Encrypt with the LPN ProblemSeparating Models of Learning with Faulty TeachersBKW meets Fourier new algorithms for LPN with sparse paritiesCovert learning: how to learn with an untrusted intermediarySolving the learning parity with noise's open questionComputational fuzzy extractorsAgnostic Learning from Tolerant Natural ProofsA family of trapdoor ciphersCPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPNNew Algorithms for Learning in Presence of ErrorsUnnamed ItemTinyKeys: a new approach to efficient multi-party computationParallel and Concurrent Security of the HB and HB +  ProtocolsOn the Fourier spectrum of symmetric Boolean functionsUnnamed ItemTwo-Round Man-in-the-Middle Security from LPNPerfect Structure on the Edge of ChaosAn improved algorithm for learning sparse parities in the presence of noiseParallel and concurrent security of the HB and \(HB^{+}\) protocolsAn iterative correction method for practically LPN solvingAmortized NISC over \(\mathbb{Z}_{2^k}\) from RMFEFast public-key silent OT and more from constrained Naor-ReingoldThe hardness of LPN over any integer ring and field for PCG applicationsLossy cryptography from code-based assumptionsNon-interactive zero-knowledge from LPN and MQSeparating models of learning with faulty teachersBreaking the circuit size barrier for secure computation under quasi-polynomial LPNLarge scale, actively secure computation from LPN and free-XOR garbled circuitsTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNCryptography with constant input localitySynthesizers and their application to the parallel construction of pseudo-random functionsOblivious Transfer Based on the McEliece AssumptionsEfficient pseudorandom correlation generators from ring-LPNUnnamed ItemThe Complexity of Public-Key CryptographyPseudorandom Functions: Three Decades LaterHomomorphic EncryptionTowards efficient LPN-based symmetric encryption







This page was built for publication: