Efficient Authentication from Hard Learning Problems
暂无分享,去创建一个
[1] Vadim Lyubashevsky,et al. Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs , 2013, IACR Cryptol. ePrint Arch..
[2] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, EUROCRYPT.
[3] Kwangjo Kim,et al. Securing HB+ against GRS Man-in-the-Middle Attack , 2007 .
[4] Michael Kearns,et al. Efficient noise-tolerant learning from statistical queries , 1993, STOC.
[5] RegevOded,et al. On Ideal Lattices and Learning with Errors over Rings , 2013 .
[6] N. Fisher,et al. Probability Inequalities for Sums of Bounded Random Variables , 1994 .
[7] R. Jueneman,et al. Message authentication , 1985, IEEE Communications Magazine.
[8] Jacques Stern,et al. An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding , 1996, EUROCRYPT.
[9] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[10] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[11] Yannick Seurin,et al. Good Variants of HB+ Are Hard to Find , 2008, Financial Cryptography.
[12] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[13] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[14] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[15] Richard J. Lipton,et al. Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.
[16] Jorge Munilla,et al. HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.
[17] Martin Fürer,et al. Faster integer multiplication , 2007, STOC '07.
[18] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[19] Thomas Kailath,et al. Fast reliable algorithms for matrices with structure , 1999 .
[20] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[21] Jack Dongarra,et al. Templates for the Solution of Algebraic Eigenvalue Problems , 2000, Software, environments, tools.
[22] Eike Kiltz,et al. Message Authentication, Revisited , 2012, EUROCRYPT.
[23] Xavier Boyen,et al. Lattice Mixing and Vanishing Trapdoors A Framework for Fully Secure Short Signatures and more , 2010 .
[24] Arnold Schönhage,et al. Schnelle Multiplikation großer Zahlen , 1971, Computing.
[25] Éric Levieil,et al. An Improved LPN Algorithm , 2006, SCN.
[26] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[27] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[28] Ivan Damgård,et al. On the Amortized Complexity of Zero-Knowledge Protocols , 2009, CRYPTO.
[29] Hoeteck Wee,et al. Fully, (Almost) Tightly Secure IBE and Dual System Groups , 2013, CRYPTO.
[30] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[31] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, Journal of Cryptology.
[32] Krzysztof Pietrzak,et al. Subspace LWE , 2012, TCC.
[33] Julien Bringer,et al. HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[34] John Watrous. Zero-Knowledge against Quantum Attacks , 2009, SIAM J. Comput..
[35] Jeroen van de Graaf,et al. Towards a formal definition of security for quantum protocols , 1998 .
[36] Christof Paar,et al. Lapin: An Efficient Authentication Protocol Based on Ring-LPN , 2012, FSE.
[37] Serge Vaudenay,et al. On the Security of HB# against a Man-in-the-Middle Attack , 2008, ASIACRYPT.
[38] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[39] Yannick Seurin,et al. HB#: Increasing the Security and Efficiency of HB+ , 2008, EUROCRYPT.