scientific article; zbMATH DE number 2081058

From MaRDI portal
Publication:4474165

zbMath1062.94549MaRDI QIDQ4474165

Nicholas J. Hopper, Manuel Blum

Publication date: 4 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480052.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

On solving LPN using BKW and variants, Implementation and analysisThe Cryptographic Power of Random SelectionSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNCryptography from Learning Parity with NoiseAn approach for stream ciphers design based on joint computing over random and secret dataAuthentication in the bounded storage modelWhen are identification protocols with sparse challenges safe? The case of the Coskun and Herley attackOptimization of $$\mathsf {LPN}$$ Solving AlgorithmsLearning parities in the mistake-bound modelEfficient authentication from hard learning problemsLearning with physical rounding for linear and quadratic leakage functionsHow to Encrypt with the LPN ProblemBKW meets Fourier new algorithms for LPN with sparse paritiesSolving the learning parity with noise's open questionSecurity and Trust in Sensor NetworksAgnostic Learning from Tolerant Natural ProofsNew Algorithms for Learning in Presence of ErrorsComputing low-weight discrete logarithmsSecure computation without computersParallel and Concurrent Security of the HB and HB +  ProtocolsOn the Security of HB# against a Man-in-the-Middle AttackTwo-Round Man-in-the-Middle Security from LPNFinding Correlations in Subquadratic Time, with Applications to Learning Parities and the Closest Pair ProblemImproved learning of \(k\)-paritiesAn improved algorithm for learning sparse parities in the presence of noiseParallel and concurrent security of the HB and \(HB^{+}\) protocolsA protocol for provably secure authentication of a tiny entity to a high performance computing oneSolving LPN using covering codesCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNCryptography with constant input localityBehavioCog: An Observation Resistant Authentication SchemeUnnamed ItemTowards efficient LPN-based symmetric encryption