Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Authenticating Pervasive Devices with Human Protocols - MaRDI portal

Authenticating Pervasive Devices with Human Protocols

From MaRDI portal
Publication:5451032

DOI10.1007/11535218_18zbMath1145.94470OpenAlexW2160584199MaRDI QIDQ5451032

Stephen A. Weis, Ari Juels

Publication date: 17 March 2008

Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11535218_18




Related Items (33)

On solving LPN using BKW and variants, Implementation and analysisThe Cryptographic Power of Random SelectionSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNCryptography from Learning Parity with NoiseLow-Cost Cryptography for Privacy in RFID SystemsAuthentication in the bounded storage modelWhen are identification protocols with sparse challenges safe? The case of the Coskun and Herley attackOptimization of $$\mathsf {LPN}$$ Solving AlgorithmsEfficient authentication from hard learning problemsHow to Encrypt with the LPN ProblemBKW meets Fourier new algorithms for LPN with sparse paritiesSQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID TagsSolving the learning parity with noise's open questionSide-channel resistant crypto for less than 2,300 GEOn Privacy Models for RFIDCPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPNsLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitivesCode-Based Public-Key Cryptosystems and Their ApplicationsParallel and Concurrent Security of the HB and HB +  ProtocolsOn the Security of HB# against a Man-in-the-Middle AttackGood Variants of HB +  Are Hard to FindEvaluation and Cryptanalysis of the Pandaka Lightweight CipherTwo-Round Man-in-the-Middle Security from LPNParallel and concurrent security of the HB and \(HB^{+}\) protocolsA protocol for provably secure authentication of a tiny entity to a high performance computing one: Increasing the Security and Efficiency ofEfficient RFID authentication protocols based on pseudorandom sequence generatorsSolving LPN using covering codesCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNCryptography with constant input localityHash Functions and RFID Tags: Mind the GapUnnamed ItemTowards efficient LPN-based symmetric encryption


Uses Software



This page was built for publication: Authenticating Pervasive Devices with Human Protocols