{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T12:44:07Z","timestamp":1648903447597},"reference-count":26,"publisher":"Elsevier BV","issue":"5-6","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100004837","name":"Ministerio de Ciencia e Innovaci\u00f3n","doi-asserted-by":"crossref","award":["TIN2011-28689-C02-02","CSD-2007-00050","CSD-2007-0004"]},{"DOI":"10.13039\/501100004895","name":"European Social Fund","doi-asserted-by":"crossref"},{"DOI":"10.13039\/501100002809","name":"Generalitat de Catalunya","doi-asserted-by":"publisher","award":["2009SGR145","2009SGR442"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Parallel Computing"],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1016\/j.parco.2014.04.002","type":"journal-article","created":{"date-parts":[[2014,4,21]],"date-time":"2014-04-21T16:18:07Z","timestamp":1398097087000},"page":"100-112","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"title":["MPI-based implementation of an enhanced algorithm to solve the LPN problem in a memory-constrained environment"],"prefix":"10.1016","volume":"40","author":[{"given":"Ivan","family":"Teixid\u00f3","sequence":"first","affiliation":[]},{"given":"Francesc","family":"Seb\u00e9","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Conde","sequence":"additional","affiliation":[]},{"given":"Francesc","family":"Solsona","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.parco.2014.04.002_b0005","unstructured":"FIPS PUB 197, The official AES standard, 2001."},{"key":"10.1016\/j.parco.2014.04.002_b0010","unstructured":"FIPS PUB 180-4, Secure hash standard, 2012."},{"key":"10.1016\/j.parco.2014.04.002_b0015","series-title":"Advances in Cryptology \u2013 CRYPTO 2005","first-page":"293","article-title":"Authenticating pervasive devices with human protocols","volume":"vol. 3621","author":"Juels","year":"2005"},{"key":"10.1016\/j.parco.2014.04.002_b0020","series-title":"Advances in Cryptology \u2013 ASIACRYPT 2001","first-page":"52","article-title":"Secure human identification protocols","volume":"vol. 2248","author":"Hopper","year":"2001"},{"key":"10.1016\/j.parco.2014.04.002_b0025","series-title":"Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU\u201906)","first-page":"28","article-title":"HB++: a lightweight authentication protocol secure against some attacks","author":"Bringer","year":"2006"},{"key":"10.1016\/j.parco.2014.04.002_b0030","unstructured":"D.N. Duc, K. Kim, Securing HB+ against GRS man-in-the-middle attack, in: I. The Institute of Electronics, C. Engineers (Ed.), Symposium of Cryptography and Information Security, The Institute of Electronics, Information and Communication Engineers, Sasebo, 2007, pp. 23\u201326."},{"key":"10.1016\/j.parco.2014.04.002_b0035","doi-asserted-by":"crossref","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","article-title":"HB-MP: a further step in the HB-family of lightweight authentication protocols","volume":"51","author":"Munilla","year":"2007","journal-title":"Comput. Netw."},{"key":"10.1016\/j.parco.2014.04.002_b0040","series-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","first-page":"361","article-title":"HB#: increasing the security and efficiency of HB+","volume":"vol. 4965","author":"Gilbert","year":"2008"},{"key":"10.1016\/j.parco.2014.04.002_b0045","series-title":"Financial Cryptography and Data Security","first-page":"156","article-title":"Good variants of HB+ are hard to find","volume":"vol. 5143","author":"Gilbert","year":"2008"},{"key":"10.1016\/j.parco.2014.04.002_b0050","series-title":"Advances in Cryptology - ASIACRYPT 2008","first-page":"108","article-title":"On the security of HB# against a man-in-the-middle attack","volume":"vol. 5350","author":"Ouafi","year":"2008"},{"key":"10.1016\/j.parco.2014.04.002_b0055","series-title":"2009 IEEE International Conference on","first-page":"186","article-title":"HB-MP++ protocol: an ultra light-weight authentication protocol for RFID systems","author":"Yoon","year":"2009"},{"key":"10.1016\/j.parco.2014.04.002_b0060","series-title":"Fast Software Encryption","first-page":"346","article-title":"Lapin: an efficient authentication protocol based on Ring-LPN","volume":"vol. 7549","author":"Heyse","year":"2012"},{"key":"10.1016\/j.parco.2014.04.002_b0065","unstructured":"D.J. Bernstein, T. Lange, Never trust a bunny, Cryptology ePrint Archive, Report 2012\/355, 2012. ."},{"key":"10.1016\/j.parco.2014.04.002_b0070","series-title":"Proceedings of the 5th IFIP WG 11.2 International Conference on Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication","first-page":"244","article-title":"Practical attacks on HB and HB+ protocols","author":"Golebiewski","year":"2011"},{"key":"10.1016\/j.parco.2014.04.002_b0075","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1145\/792538.792543","article-title":"Noise-tolerant learning, the parity problem, and the statistical query model","volume":"50","author":"Blum","year":"2003","journal-title":"J. ACM"},{"key":"10.1016\/j.parco.2014.04.002_b0080","series-title":"Security and Cryptography for Networks","first-page":"348","article-title":"An improved LPN algorithm","volume":"vol. 4116","author":"Levieil","year":"2006"},{"key":"10.1016\/j.parco.2014.04.002_b0085","series-title":"Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques","first-page":"378","article-title":"The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem","volume":"vol. 3624","author":"Lyubashevsky","year":"2005"},{"key":"10.1016\/j.parco.2014.04.002_b0090","doi-asserted-by":"crossref","unstructured":"M.P. Fossorier, M.J. Mihaljevic, H. Imai, Y. Cui, K. Matsuura, A novel algorithm for solving the LPN problem and its application to security evaluation of the HB protocol for RFID authentication, Cryptology ePrint Archive, Report 2006\/197, 2006. .","DOI":"10.1007\/11941378_5"},{"key":"10.1016\/j.parco.2014.04.002_b0095","unstructured":"P. Kirchner, Improved generalized birthday attack, Cryptology ePrint Archive, Report 2011\/377, 2011. ."},{"key":"10.1016\/j.parco.2014.04.002_b0100","series-title":"Combinatorial Algorithms: Generation, Enumeration, and Search (Discrete Mathematics and Its Applications)","author":"Kreher","year":"1998"},{"key":"10.1016\/j.parco.2014.04.002_b0105","unstructured":"T.O.M. Project, Open MPI: open source high performance computing. ."},{"key":"10.1016\/j.parco.2014.04.002_b0110","unstructured":"N. Corporation, High performance computing (hpc) \u2013 supercomputing with NVIDIA Tesla. ."},{"key":"10.1016\/j.parco.2014.04.002_b0115","series-title":"Grid Computing: Making the Global Infrastructure a Reality","author":"Berman","year":"2003"},{"key":"10.1016\/j.parco.2014.04.002_b0120","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1002\/spe.432","article-title":"A taxonomy and survey of grid resource management systems for distributed computing","volume":"32","author":"Krauter","year":"2002","journal-title":"Softw. Pract. Experience"},{"key":"10.1016\/j.parco.2014.04.002_b0125","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/1041680.1041681","article-title":"A survey of peer-to-peer content distribution technologies","volume":"36","author":"Androutsellis-Theotokis","year":"2004","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.parco.2014.04.002_b0130","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.future.2007.06.007","article-title":"Using P2P, GRID and agent technologies for the development of content distribution networks","volume":"24","author":"Fortino","year":"2008","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167819114000453?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167819114000453?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T07:18:36Z","timestamp":1572679116000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167819114000453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":26,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["S0167819114000453"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.parco.2014.04.002","relation":{},"ISSN":["0167-8191"],"issn-type":[{"value":"0167-8191","type":"print"}],"subject":["Artificial Intelligence","Computer Graphics and Computer-Aided Design","Computer Networks and Communications","Hardware and Architecture","Theoretical Computer Science","Software"],"published":{"date-parts":[[2014,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"MPI-based implementation of an enhanced algorithm to solve the LPN problem in a memory-constrained environment","name":"articletitle","label":"Article Title"},{"value":"Parallel Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.parco.2014.04.002","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}