The following pages link to (Q4474165):
Displaying 32 items.
- On solving LPN using BKW and variants, Implementation and analysis (Q276557) (← links)
- Secure computation without computers (Q517015) (← links)
- Cryptography with constant input locality (Q1037233) (← links)
- When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack (Q1676238) (← links)
- Efficient authentication from hard learning problems (Q1698400) (← links)
- Computing low-weight discrete logarithms (Q1746959) (← links)
- A protocol for provably secure authentication of a tiny entity to a high performance computing one (Q1793779) (← links)
- Learning parities in the mistake-bound model (Q1944027) (← links)
- An improved algorithm for learning sparse parities in the presence of noise (Q2034402) (← links)
- Towards efficient LPN-based symmetric encryption (Q2117050) (← links)
- Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN (Q2129007) (← links)
- Authentication in the bounded storage model (Q2170109) (← links)
- Solving LPN using covering codes (Q2303453) (← links)
- An approach for stream ciphers design based on joint computing over random and secret data (Q2390944) (← links)
- Solving the learning parity with noise's open question (Q2444770) (← links)
- BKW meets Fourier new algorithms for LPN with sparse parities (Q2697880) (← links)
- Two-Round Man-in-the-Middle Security from LPN (Q2796127) (← links)
- Finding Correlations in Subquadratic Time, with Applications to Learning Parities and the Closest Pair Problem (Q2796401) (← links)
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN (Q2835589) (← links)
- The Cryptographic Power of Random Selection (Q2889867) (← links)
- Cryptography from Learning Parity with Noise (Q2891361) (← links)
- Optimization of $$\mathsf {LPN}$$ Solving Algorithms (Q2958144) (← links)
- New Algorithms for Learning in Presence of Errors (Q3012822) (← links)
- How to Encrypt with the LPN Problem (Q3519542) (← links)
- Parallel and Concurrent Security of the HB and HB + Protocols (Q3593090) (← links)
- On the Security of HB# against a Man-in-the-Middle Attack (Q3600368) (← links)
- (Q4638058) (← links)
- Agnostic Learning from Tolerant Natural Proofs (Q5002638) (← links)
- Security and Trust in Sensor Networks (Q5391135) (← links)
- BehavioCog: An Observation Resistant Authentication Scheme (Q5854425) (← links)
- Improved learning of \(k\)-parities (Q5918966) (← links)
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols (Q5962225) (← links)