: Increasing the Security and Efficiency of
From MaRDI portal
Publication:5458602
Recommendations
- Good Variants of HB + Are Hard to Find
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
- HB-MP: a further step in the HB-family of lightweight authentication protocols
- Parallel and Concurrent Security of the HB and HB + Protocols
- Authenticating Pervasive Devices with Human Protocols
Cites work
- scientific article; zbMATH DE number 1676651 (Why is no real title available?)
- scientific article; zbMATH DE number 1406775 (Why is no real title available?)
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
- An Improved LPN Algorithm
- Authenticating Pervasive Devices with Human Protocols
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Good Variants of HB + Are Hard to Find
- HB-MP: a further step in the HB-family of lightweight authentication protocols
- New Lightweight DES Variants
- On the fly authentication and signature schemes based on groups of unknown order
- PRESENT: An Ultra-Lightweight Block Cipher
- Parallel and Concurrent Security of the HB and HB + Protocols
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
- Public Key Cryptography and RFID Tags
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
- The computational complexity of universal hashing
- Theory of Cryptography
Cited in
(27)- Parallel and Concurrent Security of the HB and HB + Protocols
- Optimization of \(\mathsf {LPN}\) solving algorithms
- Security and trust in sensor networks
- Smashing SQUASH-0
- On solving LPN using BKW and variants, Implementation and analysis
- How to Encrypt with the LPN Problem
- Towards efficient LPN-based symmetric encryption
- An iterative correction method for practically LPN solving
- Authenticating Pervasive Devices with Human Protocols
- Good Variants of HB + Are Hard to Find
- On the Security of HB# against a Man-in-the-Middle Attack
- Algebraic analysis on \(\text{HB}^\#\) authentication protocol
- Exploring crypto dark matter: new simple PRF candidates and their applications
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
- An approach for stream ciphers design based on joint computing over random and secret data
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Solving LPN using covering codes
- A protocol for provably secure authentication of a tiny entity to a high performance computing one
- The cryptographic power of random selection
- Cryptography from learning parity with noise
- HB-MP: a further step in the HB-family of lightweight authentication protocols
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
- Efficient authentication from hard learning problems
- An Improved LPN Algorithm
- Two-round man-in-the-middle security from LPN
- Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks
This page was built for publication:
- Increasing the Security and Efficiency of
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458602)