Guo, Qian; Johansson, Thomas; Löndahl, Carl Solving LPN using covering codes. (English) Zbl 1455.94161 J. Cryptology 33, No. 1, 1-33 (2020). MSC: 94A60 94B75 PDF BibTeX XML Cite \textit{Q. Guo} et al., J. Cryptology 33, No. 1, 1--33 (2020; Zbl 1455.94161) Full Text: DOI
Zhao, Shuoyao; Yu, Yu; Zhang, Jiang Secure outsourcing of cryptographic circuits. (English) Zbl 1421.94082 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 94-108 (2018). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. Zhao} et al., Lect. Notes Comput. Sci. 11192, 94--108 (2018; Zbl 1421.94082) Full Text: DOI
Devadas, Srinivas; Ren, Ling; Xiao, Hanshen On iterative collision search for LPN and subset sum. (English) Zbl 1416.68143 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 729-746 (2017). MSC: 68T05 68T20 68W40 94A60 PDF BibTeX XML Cite \textit{S. Devadas} et al., Lect. Notes Comput. Sci. 10678, 729--746 (2017; Zbl 1416.68143) Full Text: DOI
Han, Shuai; Liu, Shengli KDM-secure public-key encryption from constant-noise LPN. (English) Zbl 1386.94073 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 44-64 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Han} and \textit{S. Liu}, Lect. Notes Comput. Sci. 10342, 44--64 (2017; Zbl 1386.94073) Full Text: DOI
Zhang, Bin; Jiao, Lin; Wang, Mingsheng Faster algorithms for solving LPN. (English) Zbl 1347.94064 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 168-195 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Zhang} et al., Lect. Notes Comput. Sci. 9665, 168--195 (2016; Zbl 1347.94064) Full Text: DOI
Pessl, Peter; Mangard, Stefan Enhancing side-channel analysis of binary-field multiplication with bit reliability. (English) Zbl 1334.94093 Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 255-270 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Pessl} and \textit{S. Mangard}, Lect. Notes Comput. Sci. 9610, 255--270 (2016; Zbl 1334.94093) Full Text: DOI
Albrecht, Martin R.; Cid, Carlos; Faugère, Jean-Charles; Fitzpatrick, Robert; Perret, Ludovic On the complexity of the BKW algorithm on LWE. (English) Zbl 1331.94051 Des. Codes Cryptography 74, No. 2, 325-354 (2015). MSC: 94A60 68Q25 68Q17 PDF BibTeX XML Cite \textit{M. R. Albrecht} et al., Des. Codes Cryptography 74, No. 2, 325--354 (2015; Zbl 1331.94051) Full Text: DOI
Guo, Qian; Johansson, Thomas; Löndahl, Carl Solving LPN using covering codes. (English) Zbl 1306.94059 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 1-20 (2014). MSC: 94A60 94B75 PDF BibTeX XML Cite \textit{Q. Guo} et al., Lect. Notes Comput. Sci. 8873, 1--20 (2014; Zbl 1306.94059) Full Text: DOI
Lyubashevsky, Vadim; Masny, Daniel Man-in-the-middle secure authentication schemes from LPN and weak PRFs. (English) Zbl 1316.94102 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 308-325 (2013). MSC: 94A62 PDF BibTeX XML Cite \textit{V. Lyubashevsky} and \textit{D. Masny}, Lect. Notes Comput. Sci. 8043, 308--325 (2013; Zbl 1316.94102) Full Text: DOI
Juels, Ari; Weis, Stephen A. Authenticating pervasive devices with human protocols. (English) Zbl 1145.94470 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 293-308 (2005). MSC: 94A62 PDF BibTeX XML Cite \textit{A. Juels} and \textit{S. A. Weis}, Lect. Notes Comput. Sci. 3621, 293--308 (2005; Zbl 1145.94470) Full Text: DOI