Analyzing the HB and HB+ Protocols in the "Large Error" Case
暂无分享,去创建一个
[1] Selmer M. Johnson. A new upper bound for error-correcting codes , 1962, IRE Trans. Inf. Theory.
[2] Selmer M. Johnson. Improved asymptotic bounds for error-correcting codes , 1963, IEEE Trans. Inf. Theory.
[3] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[4] Richard J. Lipton,et al. Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.
[5] Michael Kearns,et al. Efficient noise-tolerant learning from statistical queries , 1993, STOC.
[6] Florent Chabaud,et al. On the Security of Some Cryptosystems Based on Error-correcting Codes , 1994, EUROCRYPT.
[7] Manuel Blum,et al. A Secure Human-Computer Authentication Scheme , 2000 .
[8] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[9] Venkatesan Guruswami,et al. Extensions to the Johnson bound , 2001 .
[10] Johan Håstad,et al. Some optimal inapproximability results , 2001, JACM.
[11] Adam Tauman Kalai,et al. Noise-tolerant learning, the parity problem, and the statistical query model , 2000, STOC '00.
[12] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[13] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[14] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, EUROCRYPT.