Pages that link to "Item:Q2849403"
From MaRDI portal
The following pages link to Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs (Q2849403):
Displaying 12 items.
- On solving LPN using BKW and variants, Implementation and analysis (Q276557) (← links)
- Efficient authentication from hard learning problems (Q1698400) (← links)
- A protocol for provably secure authentication of a tiny entity to a high performance computing one (Q1793779) (← links)
- Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions (Q2061985) (← links)
- Towards efficient LPN-based symmetric encryption (Q2117050) (← links)
- Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN (Q2129007) (← links)
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions (Q2161418) (← links)
- From non-adaptive to adaptive pseudorandom functions (Q2344050) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)
- Two-Round Man-in-the-Middle Security from LPN (Q2796127) (← links)
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN (Q2835589) (← links)
- Optimization of $$\mathsf {LPN}$$ Solving Algorithms (Q2958144) (← links)