Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference33 articles.
1. He, L., Gan, Y., Li, N.-N., & Zhang, T. (2008). An improved HB ++ protocol against man-in-middle attack in RFID system. In 2008 4th international conference on wireless communications, networking and mobile computing (pp. 1–4).
2. Bogos, S., & Vaudenay, S. (2016). Optimization of LPN solving algorithms. In International conference on the theory and application of cryptology and information security (pp. 703–728).
3. Bogos, S. M. (2017). LPN in cryptography: An algorithmic study. Ecole Polytechnique Fédérale de Lausanne.
4. Brakerski, Z., Lyubashevsky, V., Vaikuntanathan, V., & Wichs, D. (2019). Worst-case hardness for LPN and cryptographic hashing via code smoothing. In Annual international conference on the theory and applications of cryptographic techniques (pp. 619–635).
5. Hopper, N. J., & Blum, M. (2000). A secure human–computer authentication scheme. Carnegie-Mellon Univ Pittsburgh Pa School Of Computer Science.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献