: Increasing the Security and Efficiency of
From MaRDI portal
Publication:5458602
DOI10.1007/978-3-540-78967-3_21zbMath1149.94334OpenAlexW1517036210MaRDI QIDQ5458602
Yannick Seurin, Matthew J. B. Robshaw, Henri Gilbert
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_21
Related Items (18)
On solving LPN using BKW and variants, Implementation and analysis ⋮ The Cryptographic Power of Random Selection ⋮ Cryptography from Learning Parity with Noise ⋮ Exploring crypto dark matter: new simple PRF candidates and their applications ⋮ An approach for stream ciphers design based on joint computing over random and secret data ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Optimization of $$\mathsf {LPN}$$ Solving Algorithms ⋮ Efficient authentication from hard learning problems ⋮ How to Encrypt with the LPN Problem ⋮ Security and Trust in Sensor Networks ⋮ On the Security of HB# against a Man-in-the-Middle Attack ⋮ Good Variants of HB + Are Hard to Find ⋮ Two-Round Man-in-the-Middle Security from LPN ⋮ Parallel and concurrent security of the HB and \(HB^{+}\) protocols ⋮ A protocol for provably secure authentication of a tiny entity to a high performance computing one ⋮ Efficient RFID authentication protocols based on pseudorandom sequence generators ⋮ Solving LPN using covering codes ⋮ Towards efficient LPN-based symmetric encryption
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- On the fly authentication and signature schemes based on groups of unknown order
- HB-MP: a further step in the HB-family of lightweight authentication protocols
- The computational complexity of universal hashing
- New Lightweight DES Variants
- PRESENT: An Ultra-Lightweight Block Cipher
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
- An Improved LPN Algorithm
- Parallel and Concurrent Security of the HB and HB + Protocols
- Good Variants of HB + Are Hard to Find
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Public Key Cryptography and RFID Tags
- Authenticating Pervasive Devices with Human Protocols
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
- Theory of Cryptography
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
This page was built for publication:
- Increasing the Security and Efficiency of