Guo, Qian; Johansson, Thomas; Löndahl, Carl Solving LPN using covering codes. (English) Zbl 1455.94161 J. Cryptology 33, No. 1, 1-33 (2020). MSC: 94A60 94B75 PDF BibTeX XML Cite \textit{Q. Guo} et al., J. Cryptology 33, No. 1, 1--33 (2020; Zbl 1455.94161) Full Text: DOI
Blocki, Jeremiah; Blum, Manuel; Datta, Anupam; Vempala, Santosh Towards human computable passwords. (English) Zbl 1402.94073 Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 10, 47 p. (2017). MSC: 94A62 68Q17 68Q25 94A60 PDF BibTeX XML Cite \textit{J. Blocki} et al., LIPIcs -- Leibniz Int. Proc. Inform. 67, Article 10, 47 p. (2017; Zbl 1402.94073) Full Text: DOI
Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek Efficient authentication from hard learning problems. (English) Zbl 1386.94096 J. Cryptology 30, No. 4, 1238-1275 (2017). MSC: 94A62 PDF BibTeX XML Cite \textit{E. Kiltz} et al., J. Cryptology 30, No. 4, 1238--1275 (2017; Zbl 1386.94096) Full Text: DOI
Tomović, Siniša; Mihaljević, Miodrag J.; Perović, Aleksandar; Ognjanović, Zoran A protocol for provably secure authentication of a tiny entity to a high performance computing one. (English) Zbl 1400.94187 Math. Probl. Eng. 2016, Article ID 9289050, 9 p. (2016). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{S. Tomović} et al., Math. Probl. Eng. 2016, Article ID 9289050, 9 p. (2016; Zbl 1400.94187) Full Text: DOI
Yu, Yu; Zhang, Jiang Cryptography with auxiliary input and trapdoor from constant-noise LPN. (English) Zbl 1378.94071 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 214-243 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Yu} and \textit{J. Zhang}, Lect. Notes Comput. Sci. 9814, 214--243 (2016; Zbl 1378.94071) Full Text: DOI
Katz, Jonathan; Shin, Ji Sun; Smith, Adam Parallel and concurrent security of the HB and \(HB^{+}\) protocols. (English) Zbl 1201.94090 J. Cryptology 23, No. 3, 402-421 (2010). Reviewer: Jörg Desel (Hagen) MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{J. Katz} et al., J. Cryptology 23, No. 3, 402--421 (2010; Zbl 1201.94090) Full Text: DOI
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal Cryptography with constant input locality. (English) Zbl 1183.94018 J. Cryptology 22, No. 4, 429-469 (2009). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A60 94A62 94B05 94B99 PDF BibTeX XML Cite \textit{B. Applebaum} et al., J. Cryptology 22, No. 4, 429--469 (2009; Zbl 1183.94018) Full Text: DOI
Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model. (English) Zbl 1237.94060 Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 240-251 (2009). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Dowsley} et al., Lect. Notes Comput. Sci. 5473, 240--251 (2009; Zbl 1237.94060) Full Text: DOI
Lee, Jooyoung; Yeom, Yongjin Efficient RFID authentication protocols based on pseudorandom sequence generators. (English) Zbl 1237.94110 Des. Codes Cryptography 51, No. 2, 195-210 (2009). MSC: 94A62 94A55 PDF BibTeX XML Cite \textit{J. Lee} and \textit{Y. Yeom}, Des. Codes Cryptography 51, No. 2, 195--210 (2009; Zbl 1237.94110) Full Text: DOI
Nojima, Ryo; Imai, Hideki; Kobara, Kazukuni; Morozov, Kirill Semantic security for the McEliece cryptosystem without random oracles. (English) Zbl 1196.94062 Des. Codes Cryptography 49, No. 1-3, 289-305 (2008). MSC: 94A60 11T71 14G50 PDF BibTeX XML Cite \textit{R. Nojima} et al., Des. Codes Cryptography 49, No. 1--3, 289--305 (2008; Zbl 1196.94062) Full Text: DOI
Ouafi, Khaled; Overbeck, Raphael; Vaudenay, Serge On the security of HB\(^{\#}\) against a man-in-the-middle attack. (English) Zbl 1206.94084 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 108-124 (2008). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{K. Ouafi} et al., Lect. Notes Comput. Sci. 5350, 108--124 (2008; Zbl 1206.94084) Full Text: DOI