Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek Efficient authentication from hard learning problems. (English) Zbl 1386.94096 J. Cryptology 30, No. 4, 1238-1275 (2017). MSC: 94A62 PDF BibTeX XML Cite \textit{E. Kiltz} et al., J. Cryptology 30, No. 4, 1238--1275 (2017; Zbl 1386.94096) Full Text: DOI
Tomović, Siniša; Mihaljević, Miodrag J.; Perović, Aleksandar; Ognjanović, Zoran A protocol for provably secure authentication of a tiny entity to a high performance computing one. (English) Zbl 1400.94187 Math. Probl. Eng. 2016, Article ID 9289050, 9 p. (2016). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{S. Tomović} et al., Math. Probl. Eng. 2016, Article ID 9289050, 9 p. (2016; Zbl 1400.94187) Full Text: DOI
Bogos, Sonia; Tramèr, Florian; Vaudenay, Serge On solving LPN using BKW and variants, Implementation and analysis. (English) Zbl 1338.94068 Cryptogr. Commun. 8, No. 3, 331-369 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Bogos} et al., Cryptogr. Commun. 8, No. 3, 331--369 (2016; Zbl 1338.94068) Full Text: DOI
Cash, David; Kiltz, Eike; Tessaro, Stefano Two-round man-in-the-middle security from LPN. (English) Zbl 1378.94074 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 225-248 (2016). MSC: 94A62 PDF BibTeX XML Cite \textit{D. Cash} et al., Lect. Notes Comput. Sci. 9562, 225--248 (2016; Zbl 1378.94074) Full Text: DOI
Suttichaya, Vasin; Bhattarakosol, Pattarasinee Solving the learning parity with noise’s open question. (English) Zbl 1371.94658 Inf. Process. Lett. 113, No. 14-16, 562-566 (2013). MSC: 94A60 68Q25 94A17 PDF BibTeX XML Cite \textit{V. Suttichaya} and \textit{P. Bhattarakosol}, Inf. Process. Lett. 113, No. 14--16, 562--566 (2013; Zbl 1371.94658) Full Text: DOI
Pietrzak, Krzysztof Cryptography from learning parity with noise. (English) Zbl 1298.94103 Bieliková, Mária (ed.) et al., SOFSEM 2012: Theory and practice of computer science. 38th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 21–27, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27659-0/pbk). Lecture Notes in Computer Science 7147, 99-114 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 7147, 99--114 (2012; Zbl 1298.94103) Full Text: DOI
Katz, Jonathan; Shin, Ji Sun; Smith, Adam Parallel and concurrent security of the HB and \(HB^{+}\) protocols. (English) Zbl 1201.94090 J. Cryptology 23, No. 3, 402-421 (2010). Reviewer: Jörg Desel (Hagen) MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{J. Katz} et al., J. Cryptology 23, No. 3, 402--421 (2010; Zbl 1201.94090) Full Text: DOI