Towards efficient LPN-based symmetric encryption
From MaRDI portal
Publication:2117050
DOI10.1007/978-3-030-78375-4_9zbMATH Open1498.94056OpenAlexW3170728601MaRDI QIDQ2117050FDOQ2117050
Thomas Locher, Sonia Bogos, Dario Korolija, Serge Vaudenay
Publication date: 21 March 2022
Full work available at URL: https://infoscience.epfl.ch/record/287977/files/paper_29.pdf
Cites Work
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
- Solving LPN Using Covering Codes
- Efficient Authentication from Hard Learning Problems
- An Improved LPN Algorithm
- Title not available (Why is that?)
- Title not available (Why is that?)
- Lapin: An Efficient Authentication Protocol Based on Ring-LPN
- IND-CCA Secure Cryptography Based on a Variant of the LPN Problem
- HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems
- Simple Chosen-Ciphertext Security from Low-Noise LPN
- Authenticating Pervasive Devices with Human Protocols
- : Increasing the Security and Efficiency of
- Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques
- Noise-tolerant learning, the parity problem, and the statistical query model
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
- How to Encrypt with the LPN Problem
- Title not available (Why is that?)
- Faster Algorithms for Solving LPN
- Extractors and pseudorandom generators
- Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
- Optimization of $$\mathsf {LPN}$$ Solving Algorithms
- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
- Two-Round Man-in-the-Middle Security from LPN
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
Cited In (4)
This page was built for publication: Towards efficient LPN-based symmetric encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2117050)