Scalable ciphertext compression techniques for post-quantum KEMs and their applications (Q2692345): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-64837-4_10 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3090938627 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the cost of computing isogenies between supersingular elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: The double ratchet: security notions, proofs, and modularization for the Signal protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum security proofs using semi-classical oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Functions and Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness Reuse: Extensions and Improvements / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2754169 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness Re-use in Multi-recipient Encryption Schemeas / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tighter proofs of CCA security in the quantum random oracle model / rank
 
Normal rank
Property / cites work
 
Property / cites work: CSIDH: an efficient post-quantum commutative group action / rank
 
Normal rank
Property / cites work
 
Property / cites work: CCA secure multi-recipient KEM from LPN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4472079 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography and Coding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-recipient Public-Key Encryption from Simulators in Security Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A modular analysis of the Fujisaki-Okamoto transformation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Hybrid Encryption from Weakened Key Encapsulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic authenticated key exchange in the quantum random oracle model / rank
 
Normal rank
Property / cites work
 
Property / cites work: IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key encapsulation mechanism with explicit rejection in the quantum random oracle model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043926 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Better Key Sizes (and Attacks) for LWE-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724435 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tightly-secure key-encapsulation mechanism in the quantum random oracle model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security in Communication Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to record quantum queries, and applications to quantum indifferentiability / rank
 
Normal rank

Latest revision as of 18:06, 31 July 2024

scientific article
Language Label Description Also known as
English
Scalable ciphertext compression techniques for post-quantum KEMs and their applications
scientific article

    Statements

    Scalable ciphertext compression techniques for post-quantum KEMs and their applications (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    21 March 2023
    0 references
    multi-recipient key encapsulation mechanism
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers