Found 28 Documents (Results 1–28)

100
MathJax

Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN. (English)Zbl 07512108

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 473-501 (2021).
MSC:  94B05 94A60
Full Text:

Zero-knowledge proofs for committed symmetric Boolean functions. (English)Zbl 07495921

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 339-359 (2021).
MSC:  94A60 94D10 81P94
Full Text:

Towards efficient LPN-based symmetric encryption. (English)Zbl 07493510

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 208-230 (2021).
MSC:  68M25 94A60
Full Text:

Breaking the circuit size barrier for secure computation under quasi-polynomial LPN. (English)Zbl 07440629

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 842-870 (2021).
MSC:  68P25 94A62 94A60
Full Text:

MSC:  68Qxx
Full Text:

MSC:  68Qxx
Full Text:

Solving LPN using covering codes. (English)Zbl 1455.94161

MSC:  94A60 94B75
Full Text:

Secure outsourcing of cryptographic circuits. (English)Zbl 1421.94082

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 94-108 (2018).
MSC:  94A60 94A62
Full Text:

A side-channel assisted cryptanalytic attack against QcBits. (English)Zbl 1440.94079

Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 3-23 (2017).
MSC:  94A60
Full Text:

On iterative collision search for LPN and subset sum. (English)Zbl 1416.68143

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017).
Full Text:

KDM-secure public-key encryption from constant-noise LPN. (English)Zbl 1386.94073

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 44-64 (2017).
MSC:  94A60
Full Text:

On the robustness of learning parity with noise. (English)Zbl 1398.94183

Lam, Kwok-Yan (ed.) et al., Information and communications security. 18th international conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-50010-2/pbk; 978-3-319-50011-9/ebook). Lecture Notes in Computer Science 9977, 99-106 (2016).
MSC:  94A60
Full Text:

Approximate-deterministic public key encryption from hard learning problems. (English)Zbl 1411.94075

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 25-42 (2016).
MSC:  94A60
Full Text:

Faster algorithms for solving LPN. (English)Zbl 1347.94064

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 168-195 (2016).
MSC:  94A60
Full Text:

On public key encryption from noisy codewords. (English)Zbl 1395.94267

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 417-446 (2016).
MSC:  94A60
Full Text:

Enhancing side-channel analysis of binary-field multiplication with bit reliability. (English)Zbl 1334.94093

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 255-270 (2016).
MSC:  94A60
Full Text:

Finding correlations in subquadratic time, with applications to learning parities and the closest pair problem. (English)Zbl 1333.68235

MSC:  68T05 62H20 68W40
Full Text:

On the complexity of the BKW algorithm on LWE. (English)Zbl 1331.94051

MSC:  94A60 68Q25 68Q17
Full Text:

Candidate weak pseudorandom functions in $$\mathrm{AC}^0\circ\mathrm{MOD}_2$$. (English)Zbl 1364.94519

Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 251-259 (2014).
MSC:  94A60 68Q25
Full Text:

Solving LPN using covering codes. (English)Zbl 1306.94059

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 1-20 (2014).
MSC:  94A60 94B75
Full Text:

Solving the learning parity with noise’s open question. (English)Zbl 1371.94658

MSC:  94A60 68Q25 94A17
Full Text:

Man-in-the-middle secure authentication schemes from LPN and weak PRFs. (English)Zbl 1316.94102

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 308-325 (2013).
MSC:  94A62
Full Text:

HELEN: a public-key cryptosystem based on the LPN and the decisional minimal distance problems. (English)Zbl 1312.94047

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 107-126 (2013).
MSC:  94A60
Full Text:

IND-CCA secure cryptography based on a variant of the LPN problem. (English)Zbl 1292.94056

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 485-503 (2012).
MSC:  94A60
Full Text:

Public-key cryptography from different assumptions. (English)Zbl 1293.94052

Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 171-180 (2010).
MSC:  94A60
Full Text:

Parallel and concurrent security of the HB and $$HB^{+}$$ protocols. (English)Zbl 1201.94090

MSC:  94A60 94A62
Full Text:

On cryptography with auxiliary input. (English)Zbl 1304.94046

Proceedings of the 41st annual ACM symposium on theory of computing, STOC ’09. Bethesda, MD, USA, May 31 – June 2, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-613-7). 621-630 (2009).
MSC:  94A60 94B05
Full Text:

Authenticating pervasive devices with human protocols. (English)Zbl 1145.94470

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 293-308 (2005).
MSC:  94A62
Full Text:

all top 5

all top 3

all top 3