We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the HB protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol. © 2016, International Association for Cryptologic Research
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
We present a probabilistic private-key encryption scheme named LPN-C whose security can be reduced t...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
We construct efficient authentication protocols and message-authentication codes (MACs) whose securi...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
We propose a new authentication protocol that is provably secure based on a ring variant of the lear...
The problem of developing authentication protocols dedicated to a specific scenario where an entity ...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
International audienceHB+ is a shared-key authentication protocol, proposed by Juels and Weis at Cry...
We propose a two new approaches to authentication based on the (ring-)LPN problem. In contrast to al...
Secret-key authentication protocols have recently received a considerable amount of attention, and a...
Learning parity with physical noise (LPPN) has been proposed as an assumption on which to build auth...
Abstract. Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive co...
Message authentication codes (MACs) are widely used in communication networks for authentication pur...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
We present a probabilistic private-key encryption scheme named LPN-C whose security can be reduced t...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
We construct efficient authentication protocols and message-authentication codes (MACs) whose securi...
We construct efficient authentication protocols and message authentication codes (MACs) whose securi...
We propose a new authentication protocol that is provably secure based on a ring variant of the lear...
The problem of developing authentication protocols dedicated to a specific scenario where an entity ...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
International audienceHB+ is a shared-key authentication protocol, proposed by Juels and Weis at Cry...
We propose a two new approaches to authentication based on the (ring-)LPN problem. In contrast to al...
Secret-key authentication protocols have recently received a considerable amount of attention, and a...
Learning parity with physical noise (LPPN) has been proposed as an assumption on which to build auth...
Abstract. Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive co...
Message authentication codes (MACs) are widely used in communication networks for authentication pur...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
We present a probabilistic private-key encryption scheme named LPN-C whose security can be reduced t...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...