Parallel and concurrent security of the HB and HB^+ protocols
From MaRDI portal
Publication:5962225
Recommendations
Cites work
- scientific article; zbMATH DE number 3167429 (Why is no real title available?)
- scientific article; zbMATH DE number 5485477 (Why is no real title available?)
- scientific article; zbMATH DE number 1024063 (Why is no real title available?)
- scientific article; zbMATH DE number 1088909 (Why is no real title available?)
- scientific article; zbMATH DE number 2081058 (Why is no real title available?)
- : Increasing the Security and Efficiency of
- A Parallel Repetition Theorem
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
- An Improved LPN Algorithm
- Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques
- Authenticating Pervasive Devices with Human Protocols
- Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds
- Definitions and properties of zero-knowledge proof systems
- Efficient noise-tolerant learning from statistical queries
- Good Variants of HB + Are Hard to Find
- HB-MP: a further step in the HB-family of lightweight authentication protocols
- Improved asymptotic bounds for error-correcting codes
- List decoding of error-correcting codes. Winning thesis of the 2002 ACM Doctoral Dissertation Competition
- Noise-tolerant learning, the parity problem, and the statistical query model
- On Yao's XOR-lemma
- On lattices, learning with errors, random linear codes, and cryptography
- On the Composition of Zero-Knowledge Proof Systems
- On the inherent intractability of certain coding problems (Corresp.)
- Parallel and Concurrent Security of the HB and HB + Protocols
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
- Public-key cryptosystems from the worst-case shortest vector problem
- Some optimal inapproximability results
- Theory of Cryptography
Cited in
(26)- How to Encrypt with the LPN Problem
- On solving LPN using BKW and variants, Implementation and analysis
- Towards efficient LPN-based symmetric encryption
- Efficient authentication from hard learning problems
- Solving the learning parity with noise's open question
- Extended 3-party ACCE and application to LoRaWAN 1.1
- \(k\)-SUM in the sparse regime: complexity and applications
- Two-round man-in-the-middle security from LPN
- The hardness of LPN over any integer ring and field for PCG applications
- Authenticating Pervasive Devices with Human Protocols
- HB-MP: a further step in the HB-family of lightweight authentication protocols
- : Increasing the Security and Efficiency of
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
- Two attacks against the \(F _{f }\) RFID protocol
- Parallel and Concurrent Security of the HB and HB + Protocols
- Statistically sender-private OT from LPN and derandomization
- Cryptography from learning parity with noise
- Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks
- A protocol for provably secure authentication of a tiny entity to a high performance computing one
- An Improved LPN Algorithm
- Good Variants of HB + Are Hard to Find
- On the Security of HB# against a Man-in-the-Middle Attack
- Concrete Security for Entity Recognition: The Jane Doe Protocol
- Algebraic analysis on \(\text{HB}^\#\) authentication protocol
- On the security proof of an authentication protocol from Eurocrypt 2011
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols
This page was built for publication: Parallel and concurrent security of the HB and \(HB^{+}\) protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5962225)