Learning parity with physical noise (LPPN) has been proposed as an assumption on which to build authentication protocols based on the learning parity with noise (LPN) problem. Its first advantage is to reduce the randomness requirements of standard LPN-based protocols, by directly performing erroneous computations so that no (e.g. Bernoulli-distributed) errors have to be generated on chip. At ASHES 2018, an LPPN processor was presented and confirmed the possibility to efficiently generate erroneous computations with the appropriate error rate. Since LPPN computations are key-homomorphic, they are good candidates for improved side-channel security thanks to masking, since they could theoretically lead to masked implementations with overheads...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Lapin is a new authentication protocol that has been designed for low-cost implementations. In a wor...
Secure authentication is a necessary feature for the deployment of low-cost IoT devices. Due to thei...
Hard learning problems are important building blocks for the design of various cryptographic functio...
Hard learning problems are important building blocks for the design of various cryptographic functio...
Hard learning problems are important building blocks for the design of various cryptographic functio...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
We provide a rst security evaluation of LPN-based implementations against fault attacks. Our main re...
In white-box cryptography, early protection techniques have fallen to the automated Differential Com...
Abstract. The Learning Parity with Noise problem (LPN) is appealing in cryptography as it is conside...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Lapin is a new authentication protocol that has been designed for low-cost implementations. In a wor...
Secure authentication is a necessary feature for the deployment of low-cost IoT devices. Due to thei...
Hard learning problems are important building blocks for the design of various cryptographic functio...
Hard learning problems are important building blocks for the design of various cryptographic functio...
Hard learning problems are important building blocks for the design of various cryptographic functio...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
We provide a rst security evaluation of LPN-based implementations against fault attacks. Our main re...
In white-box cryptography, early protection techniques have fallen to the automated Differential Com...
Abstract. The Learning Parity with Noise problem (LPN) is appealing in cryptography as it is conside...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
Side-channel attacks are a prominent threat to the security of cryptographic implementations. Differ...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
Side-channel adversaries represent real-world threats against (certified and uncertified) cryptograp...
Lapin is a new authentication protocol that has been designed for low-cost implementations. In a wor...