Pages that link to "Item:Q5451032"
From MaRDI portal
The following pages link to Authenticating Pervasive Devices with Human Protocols (Q5451032):
Displayed 31 items.
- On solving LPN using BKW and variants, Implementation and analysis (Q276557) (← links)
- Side-channel resistant crypto for less than 2,300 GE (Q656520) (← links)
- Efficient RFID authentication protocols based on pseudorandom sequence generators (Q1009145) (← links)
- Cryptography with constant input locality (Q1037233) (← links)
- When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack (Q1676238) (← links)
- Efficient authentication from hard learning problems (Q1698400) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- A protocol for provably secure authentication of a tiny entity to a high performance computing one (Q1793779) (← links)
- CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN (Q1981773) (← links)
- Towards efficient LPN-based symmetric encryption (Q2117050) (← links)
- Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN (Q2129007) (← links)
- Solving LPN using covering codes (Q2303453) (← links)
- Solving the learning parity with noise's open question (Q2444770) (← links)
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher (Q2794511) (← links)
- Two-Round Man-in-the-Middle Security from LPN (Q2796127) (← links)
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN (Q2835589) (← links)
- The Cryptographic Power of Random Selection (Q2889867) (← links)
- Cryptography from Learning Parity with Noise (Q2891361) (← links)
- Optimization of $$\mathsf {LPN}$$ Solving Algorithms (Q2958144) (← links)
- Low-Cost Cryptography for Privacy in RFID Systems (Q3452239) (← links)
- How to Encrypt with the LPN Problem (Q3519542) (← links)
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags (Q3525666) (← links)
- Parallel and Concurrent Security of the HB and HB + Protocols (Q3593090) (← links)
- On the Security of HB# against a Man-in-the-Middle Attack (Q3600368) (← links)
- Good Variants of HB + Are Hard to Find (Q3603007) (← links)
- (Q4638058) (← links)
- Code-Based Public-Key Cryptosystems and Their Applications (Q4931667) (← links)
- On Privacy Models for RFID (Q5387093) (← links)
- : Increasing the Security and Efficiency of (Q5458602) (← links)
- Hash Functions and RFID Tags: Mind the Gap (Q5502785) (← links)
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols (Q5962225) (← links)