Pages that link to "Item:Q5458602"
From MaRDI portal
The following pages link to : Increasing the Security and Efficiency of (Q5458602):
Displayed 18 items.
- On solving LPN using BKW and variants, Implementation and analysis (Q276557) (← links)
- Efficient RFID authentication protocols based on pseudorandom sequence generators (Q1009145) (← links)
- Exploring crypto dark matter: new simple PRF candidates and their applications (Q1631360) (← links)
- Efficient authentication from hard learning problems (Q1698400) (← links)
- A protocol for provably secure authentication of a tiny entity to a high performance computing one (Q1793779) (← links)
- Towards efficient LPN-based symmetric encryption (Q2117050) (← links)
- Solving LPN using covering codes (Q2303453) (← links)
- An approach for stream ciphers design based on joint computing over random and secret data (Q2390944) (← links)
- Two-Round Man-in-the-Middle Security from LPN (Q2796127) (← links)
- The Cryptographic Power of Random Selection (Q2889867) (← links)
- Cryptography from Learning Parity with Noise (Q2891361) (← links)
- Optimization of $$\mathsf {LPN}$$ Solving Algorithms (Q2958144) (← links)
- How to Encrypt with the LPN Problem (Q3519542) (← links)
- On the Security of HB# against a Man-in-the-Middle Attack (Q3600368) (← links)
- Good Variants of HB + Are Hard to Find (Q3603007) (← links)
- Security and Trust in Sensor Networks (Q5391135) (← links)
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols (Q5962225) (← links)
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption (Q6091130) (← links)