Authenticating Pervasive Devices with Human Protocols
From MaRDI portal
Publication:5451032
DOI10.1007/11535218_18zbMath1145.94470OpenAlexW2160584199MaRDI QIDQ5451032
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_18
Related Items (33)
On solving LPN using BKW and variants, Implementation and analysis ⋮ The Cryptographic Power of Random Selection ⋮ Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN ⋮ Cryptography from Learning Parity with Noise ⋮ Low-Cost Cryptography for Privacy in RFID Systems ⋮ Authentication in the bounded storage model ⋮ When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack ⋮ Optimization of $$\mathsf {LPN}$$ Solving Algorithms ⋮ Efficient authentication from hard learning problems ⋮ How to Encrypt with the LPN Problem ⋮ BKW meets Fourier new algorithms for LPN with sparse parities ⋮ SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags ⋮ Solving the learning parity with noise's open question ⋮ Side-channel resistant crypto for less than 2,300 GE ⋮ On Privacy Models for RFID ⋮ CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN ⋮ sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives ⋮ Code-Based Public-Key Cryptosystems and Their Applications ⋮ Parallel and Concurrent Security of the HB and HB + Protocols ⋮ On the Security of HB# against a Man-in-the-Middle Attack ⋮ Good Variants of HB + Are Hard to Find ⋮ Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher ⋮ Two-Round Man-in-the-Middle Security from LPN ⋮ Parallel and concurrent security of the HB and \(HB^{+}\) protocols ⋮ A protocol for provably secure authentication of a tiny entity to a high performance computing one ⋮ : Increasing the Security and Efficiency of ⋮ Efficient RFID authentication protocols based on pseudorandom sequence generators ⋮ Solving LPN using covering codes ⋮ Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN ⋮ Cryptography with constant input locality ⋮ Hash Functions and RFID Tags: Mind the Gap ⋮ Unnamed Item ⋮ Towards efficient LPN-based symmetric encryption
Uses Software
This page was built for publication: Authenticating Pervasive Devices with Human Protocols