{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:43:27Z","timestamp":1725497007257},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540772712"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77272-9_1","type":"book-chapter","created":{"date-parts":[[2007,12,6]],"date-time":"2007-12-06T11:56:55Z","timestamp":1196942215000},"page":"1-15","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Katz","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Bogdanov, A., Knudsen, L., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: CHES 2007. Workshop on Cryptographic Hardware and Embedded Systems (to appear, 2007)"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"E.R. Berlekamp","year":"1978","unstructured":"Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the Inherent Intractability of Certain Coding Problems. IEEE Trans. Info. Theory\u00a024, 384\u2013386 (1978)","journal-title":"IEEE Trans. Info. Theory"},{"key":"1_CR3","unstructured":"Blum, A., Furst, M., Kearns, M., Lipton, R.: Cryptographic Primitives Based on Hard Learning Problems. 773, 278\u2013291 (1994)"},{"issue":"4","key":"1_CR4","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1145\/792538.792543","volume":"50","author":"A. Blum","year":"2003","unstructured":"Blum, A., Kalai, A., Wasserman, H.: Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model. J. ACM\u00a050(4), 506\u2013519 (2003)","journal-title":"J. ACM"},{"key":"1_CR5","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: HB\u2009+\u2009+\u2009: A Lightweight Authentication Protocol Secure against Some Attacks, http:\/\/eprint.iacr.org\/2005\/440"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/BFb0053430","volume-title":"EUROCRYPT 1994","author":"F. Chabaud","year":"1995","unstructured":"Chabaud, F.: On the Security of Some Cryptosystems Based on Error-Correcting Codes. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 131\u2013139. Springer, Heidelberg (1995)"},{"issue":"6","key":"1_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. Info. Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Info. Theory"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"1_CR9","unstructured":"Fossorier, M.P.C., Mihaljev\u00edc, M.J., Imai, H., Cui, Y., Matsuura, K.: A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication, http:\/\/eprint.iacr.org"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Robshaw, M., Silbert, H.: An Active Attack against HB\u2009+\u2009: A Provably Secure Lightweight Authentication Protocol, http:\/\/eprint.iacr.org\/2005\/237","DOI":"10.1049\/el:20052622"},{"key":"1_CR11","unstructured":"Guruswami, V., Sudan, M.: Extensions to the Johnson Bound (unpublished manuscript 2001), http:\/\/citeseer.ist.psu.edu\/guruswami01extensions.html"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1145\/502090.502098","volume":"48","author":"J. H\u00e5stad","year":"2001","unstructured":"H\u00e5stad, J.: Optimal Inapproximability Results. J. ACM\u00a048(4), 798\u2013859 (2001)","journal-title":"J. ACM"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Hopper, N., Blum, M.: A Secure Human-Computer Authentication Scheme. Technical Report CMU-CS-00-139, Carnegie Mellon University (2000)","DOI":"10.21236\/ADA382135"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"ASIACRYPT 2001","author":"N. Hopper","year":"2001","unstructured":"Hopper, N., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TIT.1962.1057714","volume":"8","author":"S.M. Johnson","year":"1962","unstructured":"Johnson, S.M.: Upper Bound for Error-Correcting Codes. IEEE Trans. Info. Theory\u00a08, 203\u2013207 (1962)","journal-title":"IEEE Trans. Info. Theory"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1963.1057841","volume":"9","author":"S.M. Johnson","year":"1963","unstructured":"Johnson, S.M.: Improved Asympototic Bounds for Error-Correcting Codes. IEEE Trans. Info. Theory\u00a09, 198\u2013205 (1963)","journal-title":"IEEE Trans. Info. Theory"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.: Authenticating Pervasive Devices with Human Protocols, vol.\u00a03621, pp. 293\u2013308 (2005), http:\/\/www.rsasecurity.com\/rsalabs\/staff\/bios\/ajuels\/publications\/pdfs\/lpn.pdf","DOI":"10.1007\/11535218_18"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_6","volume-title":"EUROCRYPT 2006","author":"J. Katz","year":"2006","unstructured":"Katz, J., Shin, J.-S.: Parallel and Concurrent Security of the HB and HB\u2009+\u2009 Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, Springer, Heidelberg (2006)"},{"key":"1_CR19","unstructured":"Katz, J., Smith, A.: Analyzing the HB and HB\u2009+\u2009 Protocols in the Large Error Case, Available at http:\/\/eprint.iacr.org\/2006\/326"},{"issue":"6","key":"1_CR20","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1145\/293347.293351","volume":"45","author":"M. Kearns","year":"1998","unstructured":"Kearns, M.: Efficient Noise-Tolerant Learning from Statistical Queries. J. ACM\u00a045(6), 983\u20131006 (1998)","journal-title":"J. ACM"},{"key":"1_CR21","unstructured":"Kfir, Z., Wool, A.: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems, http:\/\/eprint.iacr.org\/2005\/052"},{"key":"1_CR22","unstructured":"Kirschenbaum, I., Wool, A.: How to Build a Low-Cost, Extended-Range RFID Skimmer, http:\/\/eprint.iacr.org\/2006\/054"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/11832072_24","volume-title":"SCN 2006","author":"E. Levieil","year":"2006","unstructured":"Levieil, E., Fouque, P.-A.: An Improved LPN Algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.\u00a04116, pp. 348\u2013359. Springer, Heidelberg (2006)"},{"key":"1_CR24","first-page":"84","volume-title":"37th ACM Symposium on Theory of Computing","author":"O. Regev","year":"2005","unstructured":"Regev, O.: On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. In: 37th ACM Symposium on Theory of Computing, pp. 84\u201393. ACM, New York (2005)"},{"key":"1_CR25","unstructured":"Weis, S.: New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing. Ph.D. thesis, MIT (2006)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77272-9_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:06:52Z","timestamp":1619521612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77272-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540772712"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77272-9_1","relation":{},"subject":[]}}