Tran, Bénédikt; Vaudenay, Serge Solving the learning parity with noise problem using quantum algorithms. (English) Zbl 1523.81049 Batina, Lejla (ed.) et al., Progress in cryptology – AFRICACRYPT 2022. 13th international conference on cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13503, 295-322 (2022). MSC: 81P68 68T05 03C10 28C20 94A60 81P94 15B34 68P10 81P73 PDFBibTeX XMLCite \textit{B. Tran} and \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 13503, 295--322 (2022; Zbl 1523.81049) Full Text: DOI
Murphy, Sean; Paterson, Maura; Swart, Christine Boolean ring cryptographic equation solving. (English) Zbl 1485.94110 Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 252-272 (2021). MSC: 94A60 16P70 13P10 68Q17 PDFBibTeX XMLCite \textit{S. Murphy} et al., Lect. Notes Comput. Sci. 12804, 252--272 (2021; Zbl 1485.94110) Full Text: DOI
Bogos, Sonia; Korolija, Dario; Locher, Thomas; Vaudenay, Serge Towards efficient LPN-based symmetric encryption. (English) Zbl 1498.94056 Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 208-230 (2021). Reviewer: Zlatko Varbanov (Veliko Tarnovo) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Bogos} et al., Lect. Notes Comput. Sci. 12727, 208--230 (2021; Zbl 1498.94056) Full Text: DOI Link
May, Alexander; Schlieper, Lars; Schwinger, Jonathan Noisy Simon period finding. (English) Zbl 1483.81044 Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 75-99 (2021). MSC: 81P68 81P73 94A60 68M15 60H40 PDFBibTeX XMLCite \textit{A. May} et al., Lect. Notes Comput. Sci. 12704, 75--99 (2021; Zbl 1483.81044) Full Text: DOI arXiv
Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian Robustly reusable fuzzy extractor with imperfect randomness. (English) Zbl 1462.94034 Des. Codes Cryptography 89, No. 5, 1017-1059 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. Cui} et al., Des. Codes Cryptography 89, No. 5, 1017--1059 (2021; Zbl 1462.94034) Full Text: DOI
Naya-Plasencia, María; Schrottenloher, André Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms. (English) Zbl 1489.81021 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 311-340 (2020). MSC: 81P94 81P70 94A60 81P65 81P68 40A25 65B10 PDFBibTeX XMLCite \textit{M. Naya-Plasencia} and \textit{A. Schrottenloher}, Lect. Notes Comput. Sci. 12106, 311--340 (2020; Zbl 1489.81021) Full Text: DOI
Guo, Qian; Johansson, Thomas; Löndahl, Carl Solving LPN using covering codes. (English) Zbl 1455.94161 J. Cryptology 33, No. 1, 1-33 (2020). MSC: 94A60 94B75 PDFBibTeX XMLCite \textit{Q. Guo} et al., J. Cryptology 33, No. 1, 1--33 (2020; Zbl 1455.94161) Full Text: DOI
Friolo, Daniele; Masny, Daniel; Venturi, Daniele A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement. (English) Zbl 1455.94154 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 111-130 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Friolo} et al., Lect. Notes Comput. Sci. 11891, 111--130 (2019; Zbl 1455.94154) Full Text: DOI
Ai, Zhijuan; Ma, Changshe; Xu, Bixia Efficient public-key encryption scheme based on Ring-LPN. (Chinese. English summary) Zbl 1449.68028 J. South China Norm. Univ., Nat. Sci. Ed. 51, No. 3, 116-122 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Z. Ai} et al., J. South China Norm. Univ., Nat. Sci. Ed. 51, No. 3, 116--122 (2019; Zbl 1449.68028) Full Text: DOI
Guo, Qian; Johansson, Thomas A new birthday-type algorithm for attacking the fresh re-keying countermeasure. (English) Zbl 1481.94105 Inf. Process. Lett. 146, 30-34 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Q. Guo} and \textit{T. Johansson}, Inf. Process. Lett. 146, 30--34 (2019; Zbl 1481.94105) Full Text: DOI
Cheng, Haitao; Li, Xiangxue; Qian, Haifeng; Yan, Di Simpler CCA secure PKE from LPN problem without double-trapdoor. (English) Zbl 1458.94224 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 756-766 (2018). MSC: 94A60 81P94 68P25 PDFBibTeX XMLCite \textit{H. Cheng} et al., Lect. Notes Comput. Sci. 11149, 756--766 (2018; Zbl 1458.94224) Full Text: DOI
Cheng, Haitao; Li, Xiangxue; Qian, Haifeng; Yan, Di CCA secure multi-recipient KEM from LPN. (English) Zbl 1458.94223 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 513-529 (2018). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{H. Cheng} et al., Lect. Notes Comput. Sci. 11149, 513--529 (2018; Zbl 1458.94223) Full Text: DOI
Zhao, Shuoyao; Yu, Yu; Zhang, Jiang Secure outsourcing of cryptographic circuits. (English) Zbl 1421.94082 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 94-108 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Zhao} et al., Lect. Notes Comput. Sci. 11192, 94--108 (2018; Zbl 1421.94082) Full Text: DOI
Minaud, Brice; Derbez, Patrick; Fouque, Pierre-Alain; Karpman, Pierre Key-recovery attacks on \(\mathsf{ASASA}\). (English) Zbl 1400.94166 J. Cryptology 31, No. 3, 845-884 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Minaud} et al., J. Cryptology 31, No. 3, 845--884 (2018; Zbl 1400.94166) Full Text: DOI
Both, Leif; May, Alexander Decoding linear codes with high error rate and its impact for LPN security. (English) Zbl 1425.94077 Lange, Tanja (ed.) et al., Post-quantum cryptography. 9th international conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10786, 25-46 (2018). MSC: 94B05 94B35 PDFBibTeX XMLCite \textit{L. Both} and \textit{A. May}, Lect. Notes Comput. Sci. 10786, 25--46 (2018; Zbl 1425.94077) Full Text: DOI
Devadas, Srinivas; Ren, Ling; Xiao, Hanshen On iterative collision search for LPN and subset sum. (English) Zbl 1416.68143 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017). MSC: 68T05 68T20 68W40 94A60 PDFBibTeX XMLCite \textit{S. Devadas} et al., Lect. Notes Comput. Sci. 10678, 729--746 (2017; Zbl 1416.68143) Full Text: DOI
Esser, Andre; Kübler, Robert; May, Alexander LPN decoded. (English) Zbl 1410.94065 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 486-514 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Esser} et al., Lect. Notes Comput. Sci. 10402, 486--514 (2017; Zbl 1410.94065) Full Text: DOI
Han, Shuai; Liu, Shengli KDM-secure public-key encryption from constant-noise LPN. (English) Zbl 1386.94073 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 44-64 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Han} and \textit{S. Liu}, Lect. Notes Comput. Sci. 10342, 44--64 (2017; Zbl 1386.94073) Full Text: DOI
Zhang, Bin; Jiao, Lin; Wang, Mingsheng Faster algorithms for solving LPN. (English) Zbl 1347.94064 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 168-195 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Zhang} et al., Lect. Notes Comput. Sci. 9665, 168--195 (2016; Zbl 1347.94064) Full Text: DOI
Bogos, Sonia; Tramèr, Florian; Vaudenay, Serge On solving LPN using BKW and variants, Implementation and analysis. (English) Zbl 1338.94068 Cryptogr. Commun. 8, No. 3, 331-369 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Bogos} et al., Cryptogr. Commun. 8, No. 3, 331--369 (2016; Zbl 1338.94068) Full Text: DOI
Pessl, Peter; Mangard, Stefan Enhancing side-channel analysis of binary-field multiplication with bit reliability. (English) Zbl 1334.94093 Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 255-270 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Pessl} and \textit{S. Mangard}, Lect. Notes Comput. Sci. 9610, 255--270 (2016; Zbl 1334.94093) Full Text: DOI
Cash, David; Kiltz, Eike; Tessaro, Stefano Two-round man-in-the-middle security from LPN. (English) Zbl 1378.94074 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 225-248 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Cash} et al., Lect. Notes Comput. Sci. 9562, 225--248 (2016; Zbl 1378.94074) Full Text: DOI
Sun, Xiaochao; Li, Bao; Lu, Xianhui Cramer-Shoup like chosen ciphertext security from LPN. (English) Zbl 1403.94080 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 79-95 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Sun} et al., Lect. Notes Comput. Sci. 9065, 79--95 (2015; Zbl 1403.94080) Full Text: DOI
Belaïd, Sonia; Coron, Jean-Sébastien; Fouque, Pierre-Alain; Gérard, Benoît; Kammerer, Jean-Gabriel; Prouff, Emmanuel Improved side-channel analysis of finite-field multiplication. (English) Zbl 1380.94073 Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 395-415 (2015). MSC: 94A60 68M07 PDFBibTeX XMLCite \textit{S. Belaïd} et al., Lect. Notes Comput. Sci. 9293, 395--415 (2015; Zbl 1380.94073) Full Text: DOI
Minaud, Brice; Derbez, Patrick; Fouque, Pierre-Alain; Karpman, Pierre Key-recovery attacks on \(\mathsf {ASASA}\). (English) Zbl 1375.94150 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 3-27 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Minaud} et al., Lect. Notes Comput. Sci. 9453, 3--27 (2015; Zbl 1375.94150) Full Text: DOI
Döttling, Nico Low noise LPN: KDM secure public key encryption and sample amplification. (English) Zbl 1345.94057 Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 604-626 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Döttling}, Lect. Notes Comput. Sci. 9020, 604--626 (2015; Zbl 1345.94057) Full Text: DOI
Albrecht, Martin R.; Cid, Carlos; Faugère, Jean-Charles; Fitzpatrick, Robert; Perret, Ludovic On the complexity of the BKW algorithm on LWE. (English) Zbl 1331.94051 Des. Codes Cryptography 74, No. 2, 325-354 (2015). MSC: 94A60 68Q25 68Q17 PDFBibTeX XMLCite \textit{M. R. Albrecht} et al., Des. Codes Cryptography 74, No. 2, 325--354 (2015; Zbl 1331.94051) Full Text: DOI
Endo, Kosei; Kunihiro, Noboru On the security proof of an authentication protocol from Eurocrypt 2011. (English) Zbl 1417.94094 Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 187-203 (2014). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{K. Endo} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 8639, 187--203 (2014; Zbl 1417.94094) Full Text: DOI
Guo, Qian; Johansson, Thomas; Löndahl, Carl Solving LPN using covering codes. (English) Zbl 1306.94059 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 1-20 (2014). MSC: 94A60 94B75 PDFBibTeX XMLCite \textit{Q. Guo} et al., Lect. Notes Comput. Sci. 8873, 1--20 (2014; Zbl 1306.94059) Full Text: DOI Link
Gaspar, Lubos; Leurent, Gaëtan; Standaert, François-Xavier Hardware implementation and side-channel analysis of Lapin. (English) Zbl 1337.94096 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 206-226 (2014). MSC: 94A62 PDFBibTeX XMLCite \textit{L. Gaspar} et al., Lect. Notes Comput. Sci. 8366, 206--226 (2014; Zbl 1337.94096) Full Text: DOI HAL
Bernstein, Daniel J.; Lange, Tanja Never trust a bunny. (English) Zbl 1337.94093 Hoepman, Jaap-Henk (ed.) et al., Radio frequency identification. Security and privacy issues. 8th international workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2–3, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36139-5/pbk). Lecture Notes in Computer Science 7739, 137-148 (2013). MSC: 94A62 PDFBibTeX XMLCite \textit{D. J. Bernstein} and \textit{T. Lange}, Lect. Notes Comput. Sci. 7739, 137--148 (2013; Zbl 1337.94093) Full Text: DOI
Lyubashevsky, Vadim; Masny, Daniel Man-in-the-middle secure authentication schemes from LPN and weak PRFs. (English) Zbl 1316.94102 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 308-325 (2013). MSC: 94A62 PDFBibTeX XMLCite \textit{V. Lyubashevsky} and \textit{D. Masny}, Lect. Notes Comput. Sci. 8043, 308--325 (2013; Zbl 1316.94102) Full Text: DOI
Chang, Ya-Fen; Tai, Wei-Liang; Chen, Chia-Chen Authentication protocols for reliable information provision systems with low computational-ability devices. (English) Zbl 1267.68028 Informatica, Vilnius 24, No. 1, 1-12 (2013). MSC: 68M10 94A62 68P25 PDFBibTeX XMLCite \textit{Y.-F. Chang} et al., Informatica, Vilnius 24, No. 1, 1--12 (2013; Zbl 1267.68028)
Heyse, Stefan; Kiltz, Eike; Lyubashevsky, Vadim; Paar, Christof; Pietrzak, Krzysztof Lapin: an efficient authentication protocol based on ring-LPN. (English) Zbl 1282.94078 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{S. Heyse} et al., Lect. Notes Comput. Sci. 7549, 346--365 (2012; Zbl 1282.94078) Full Text: DOI
Mihaljević, Miodrag J.; Imai, Hideki An approach for stream ciphers design based on joint computing over random and secret data. (English) Zbl 1172.94009 Computing 85, No. 1-2, 153-168 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{M. J. Mihaljević} and \textit{H. Imai}, Computing 85, No. 1--2, 153--168 (2009; Zbl 1172.94009) Full Text: DOI
Gilbert, Henri; Robshaw, Matthew J. B.; Seurin, Yannick Good variants of HB\(^{ + }\) are hard to find. (English) Zbl 1175.94079 Tsudik, Gene (ed.), Financial cryptography and data security. 12th international conference, FC 2008, Cozumel, Mexico, January 28–31, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-85229-2/pbk). Lecture Notes in Computer Science 5143, 156-170 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{H. Gilbert} et al., Lect. Notes Comput. Sci. 5143, 156--170 (2008; Zbl 1175.94079) Full Text: DOI
Gilbert, Henri; Robshaw, Matthew J. B.; Seurin, Yannick How to encrypt with the LPN problem. (English) Zbl 1155.94368 Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 679-690 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{H. Gilbert} et al., Lect. Notes Comput. Sci. 5126, 679--690 (2008; Zbl 1155.94368) Full Text: DOI
Gilbert, Henri; Robshaw, Matthew J. B.; Seurin, Yannick HB\(^{\#}\): Increasing the security and efficiency of HB\(^{+}\). (English) Zbl 1149.94334 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 361-378 (2008). MSC: 94A62 PDFBibTeX XMLCite \textit{H. Gilbert} et al., Lect. Notes Comput. Sci. 4965, 361--378 (2008; Zbl 1149.94334) Full Text: DOI
Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki; Cui, Yang; Matsuura, Kanta An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. (English) Zbl 1175.94078 Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 48-62 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. P. C. Fossorier} et al., Lect. Notes Comput. Sci. 4329, 48--62 (2006; Zbl 1175.94078) Full Text: DOI
Juels, Ari; Weis, Stephen A. Authenticating pervasive devices with human protocols. (English) Zbl 1145.94470 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 293-308 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Juels} and \textit{S. A. Weis}, Lect. Notes Comput. Sci. 3621, 293--308 (2005; Zbl 1145.94470) Full Text: DOI