The following pages link to (Q4341754):
Displayed 28 items.
- On solving LPN using BKW and variants, Implementation and analysis (Q276557) (← links)
- Garbling XOR gates ``for free'' in the standard model (Q315547) (← links)
- On the Fourier spectrum of symmetric Boolean functions (Q987559) (← links)
- Separating models of learning with faulty teachers (Q1017667) (← links)
- Cryptography with constant input locality (Q1037233) (← links)
- Synthesizers and their application to the parallel construction of pseudo-random functions (Q1288205) (← links)
- On the nonlinearity of monotone Boolean functions (Q1667447) (← links)
- Efficient authentication from hard learning problems (Q1698400) (← links)
- An approach for stream ciphers design based on joint computing over random and secret data (Q2390944) (← links)
- Solving the learning parity with noise's open question (Q2444770) (← links)
- Two-Round Man-in-the-Middle Security from LPN (Q2796127) (← links)
- Perfect Structure on the Edge of Chaos (Q2796138) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security (Q2829953) (← links)
- Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts (Q2835588) (← links)
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN (Q2835589) (← links)
- Cryptography from Learning Parity with Noise (Q2891361) (← links)
- FHEW with Efficient Multibit Bootstrapping (Q2946444) (← links)
- New Algorithms for Learning in Presence of Errors (Q3012822) (← links)
- Fast Pseudorandom Functions Based on Expander Graphs (Q3179351) (← links)
- How to Encrypt with the LPN Problem (Q3519542) (← links)
- Separating Models of Learning with Faulty Teachers (Q3520052) (← links)
- Parallel and Concurrent Security of the HB and HB + Protocols (Q3593090) (← links)
- Multikey Fully Homomorphic Encryption and Applications (Q4599146) (← links)
- (Q4638056) (← links)
- A family of trapdoor ciphers (Q4639336) (← links)
- Oblivious Transfer Based on the McEliece Assumptions (Q5502796) (← links)
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols (Q5962225) (← links)