An Improved LPN Algorithm
From MaRDI portal
Publication:3541899
DOI10.1007/11832072_24zbMath1152.94434OpenAlexW1605324412MaRDI QIDQ3541899
Eric Levieil, Pierre-Alain Fouque
Publication date: 27 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11832072_24
Related Items
On solving LPN using BKW and variants, Implementation and analysis ⋮ Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes ⋮ Cryptography from Learning Parity with Noise ⋮ A survey on fast correlation attacks ⋮ Coded-BKW: Solving LWE Using Lattice Codes ⋮ An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices ⋮ Making the BKW algorithm practical for LWE ⋮ Key-recovery attacks on \(\mathsf{ASASA}\) ⋮ Pseudorandom correlation functions from variable-density LPN, revisited ⋮ Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation ⋮ Solving the learning parity with noise problem using quantum algorithms ⋮ On the asymptotic complexity of solving LWE ⋮ Optimization of $$\mathsf {LPN}$$ Solving Algorithms ⋮ A non-heuristic approach to time-space tradeoffs and optimizations for BKW ⋮ Does the dual-sieve attack on learning with errors even work? ⋮ Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms ⋮ Correlated pseudorandomness from expand-accumulate codes ⋮ Efficient authentication from hard learning problems ⋮ Correlated pseudorandomness from the hardness of quasi-abelian decoding ⋮ How to Encrypt with the LPN Problem ⋮ BKW meets Fourier new algorithms for LPN with sparse parities ⋮ SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags ⋮ Solving the learning parity with noise's open question ⋮ Agnostic Learning from Tolerant Natural Proofs ⋮ A new birthday-type algorithm for attacking the fresh re-keying countermeasure ⋮ CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN ⋮ Fast Correlation Attacks: Methods and Countermeasures ⋮ On the complexity of the BKW algorithm on LWE ⋮ On the Security of HB# against a Man-in-the-Middle Attack ⋮ Good Variants of HB + Are Hard to Find ⋮ Two-Round Man-in-the-Middle Security from LPN ⋮ Parallel and concurrent security of the HB and \(HB^{+}\) protocols ⋮ : Increasing the Security and Efficiency of ⋮ Solving LPN using covering codes ⋮ Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers ⋮ Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN ⋮ Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman Algorithm ⋮ Towards efficient LPN-based symmetric encryption ⋮ He gives C-sieves on the CSIDH