HB-MP
From MaRDI portal
Software:15139
No author found.
Related Items (6)
Efficient Authentication from Hard Learning Problems ⋮ On the Security of HB# against a Man-in-the-Middle Attack ⋮ Two-Round Man-in-the-Middle Security from LPN ⋮ Parallel and concurrent security of the HB and \(HB^{+}\) protocols ⋮ A protocol for provably secure authentication of a tiny entity to a high performance computing one ⋮ On Physical Obfuscation of Cryptographic Algorithms
This page was built for software: HB-MP