An iterative correction method for practically LPN solving
From MaRDI portal
Publication:6576954
DOI10.1016/J.INS.2024.121080zbMATH Open1543.94733MaRDI QIDQ6576954FDOQ6576954
Authors: Man Kang, Lin Jiao, Yongqiang Li, Mingsheng Wang
Publication date: 23 July 2024
Published in: Information Sciences (Search for Journal in Brave)
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Decoding random linear codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)
- Security bounds for the design of code-based cryptosystems
- Title not available (Why is that?)
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- Man-in-the-middle secure authentication schemes from LPN and weak PRFs
- Solving LPN Using Covering Codes
- Efficient Authentication from Hard Learning Problems
- An Improved LPN Algorithm
- Title not available (Why is that?)
- Title not available (Why is that?)
- Lapin: an efficient authentication protocol based on ring-LPN
- HELEN: a public-key cryptosystem based on the LPN and the decisional minimal distance problems
- Authenticating Pervasive Devices with Human Protocols
- : Increasing the Security and Efficiency of
- Message authentication, revisited
- How to Encrypt with the LPN Problem
- Noise-tolerant learning, the parity problem, and the statistical query model
- Faster algorithms for solving LPN
- More on average case vs approximation complexity
- New lattice-based cryptographic constructions
- A toolkit for ring-LWE cryptography
- LPN decoded
- Dissection-BKW
- Parallel and Concurrent Security of the HB and HB + Protocols
- Optimization of \(\mathsf {LPN}\) solving algorithms
- Collision resistant hashing from sub-exponential learning parity with noise
- Worst-case hardness for LPN and cryptographic hashing via code smoothing
- Commitments and efficient zero-knowledge proofs from learning parity with noise
- How to use metaheuristics for design of symmetric-key primitives
- Universally composable oblivious transfer based on a variant of LPN
- Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN
- Solving LPN using covering codes
- S-box pipelining using genetic algorithms for high-throughput AES implementations: how fast can we go?
This page was built for publication: An iterative correction method for practically LPN solving
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6576954)