We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the (Formula presented.) protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol
The Learning Parity with Noise problem (LPN) is appealing in cryptography as it is considered to rem...
International audienceHB+ is a shared-key authentication protocol, proposed by Juels and Weis at Cry...
International audienceWe show how to construct, from any weak pseudorandom function, a 3-round symme...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
We construct efficient authentication protocols and message-authentication codes (MACs) whose securi...
The problem of developing authentication protocols dedicated to a specific scenario where an entity ...
We propose a new authentication protocol that is provably secure based on a ring variant of the lear...
Secret-key authentication protocols have recently received a considerable amount of attention, and a...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
We propose a two new approaches to authentication based on the (ring-)LPN problem. In contrast to al...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
We show how to construct, from any weak pseudorandom function, a 3-round symmetric-key authenticatio...
The Learning Parity with Noise problem (LPN) is appealing in cryptography as it is considered to rem...
International audienceHB+ is a shared-key authentication protocol, proposed by Juels and Weis at Cry...
International audienceWe show how to construct, from any weak pseudorandom function, a 3-round symme...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
We construct efficient authentication protocols and message-authentication codes (MACs) whose securi...
The problem of developing authentication protocols dedicated to a specific scenario where an entity ...
We propose a new authentication protocol that is provably secure based on a ring variant of the lear...
Secret-key authentication protocols have recently received a considerable amount of attention, and a...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
We propose a two new approaches to authentication based on the (ring-)LPN problem. In contrast to al...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom ...
We show how to construct, from any weak pseudorandom function, a 3-round symmetric-key authenticatio...
The Learning Parity with Noise problem (LPN) is appealing in cryptography as it is considered to rem...
International audienceHB+ is a shared-key authentication protocol, proposed by Juels and Weis at Cry...
International audienceWe show how to construct, from any weak pseudorandom function, a 3-round symme...