×

Found 28 Documents (Results 1–28)

100
MathJax

Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN. (English) Zbl 07512108

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 473-501 (2021).
MSC:  94B05 94A60
PDF BibTeX XML Cite
Full Text: DOI

Zero-knowledge proofs for committed symmetric Boolean functions. (English) Zbl 07495921

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 339-359 (2021).
MSC:  94A60 94D10 81P94
PDF BibTeX XML Cite
Full Text: DOI

Towards efficient LPN-based symmetric encryption. (English) Zbl 07493510

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 208-230 (2021).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Breaking the circuit size barrier for secure computation under quasi-polynomial LPN. (English) Zbl 07440629

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 842-870 (2021).
MSC:  68P25 94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

A side-channel assisted cryptanalytic attack against QcBits. (English) Zbl 1440.94079

Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 3-23 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On iterative collision search for LPN and subset sum. (English) Zbl 1416.68143

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017).
PDF BibTeX XML Cite
Full Text: DOI

KDM-secure public-key encryption from constant-noise LPN. (English) Zbl 1386.94073

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 44-64 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On the robustness of learning parity with noise. (English) Zbl 1398.94183

Lam, Kwok-Yan (ed.) et al., Information and communications security. 18th international conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-50010-2/pbk; 978-3-319-50011-9/ebook). Lecture Notes in Computer Science 9977, 99-106 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Approximate-deterministic public key encryption from hard learning problems. (English) Zbl 1411.94075

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 25-42 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Faster algorithms for solving LPN. (English) Zbl 1347.94064

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 168-195 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On public key encryption from noisy codewords. (English) Zbl 1395.94267

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 417-446 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Enhancing side-channel analysis of binary-field multiplication with bit reliability. (English) Zbl 1334.94093

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 255-270 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Candidate weak pseudorandom functions in \(\mathrm{AC}^0\circ\mathrm{MOD}_2\). (English) Zbl 1364.94519

Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 251-259 (2014).
MSC:  94A60 68Q25
PDF BibTeX XML Cite
Full Text: DOI

Solving LPN using covering codes. (English) Zbl 1306.94059

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 1-20 (2014).
MSC:  94A60 94B75
PDF BibTeX XML Cite
Full Text: DOI Link

Man-in-the-middle secure authentication schemes from LPN and weak PRFs. (English) Zbl 1316.94102

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 308-325 (2013).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

HELEN: a public-key cryptosystem based on the LPN and the decisional minimal distance problems. (English) Zbl 1312.94047

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 107-126 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

IND-CCA secure cryptography based on a variant of the LPN problem. (English) Zbl 1292.94056

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 485-503 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Public-key cryptography from different assumptions. (English) Zbl 1293.94052

Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 171-180 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On cryptography with auxiliary input. (English) Zbl 1304.94046

Proceedings of the 41st annual ACM symposium on theory of computing, STOC ’09. Bethesda, MD, USA, May 31 – June 2, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-613-7). 621-630 (2009).
MSC:  94A60 94B05
PDF BibTeX XML Cite
Full Text: DOI

Authenticating pervasive devices with human protocols. (English) Zbl 1145.94470

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 293-308 (2005).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Year of Publication

all top 3

Classification

all top 3

Software