Pages that link to "Item:Q3181027"
From MaRDI portal
The following pages link to Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms (Q3181027):
Displaying 29 items.
- Analysis of error-correcting codes for lattice-based key exchange (Q1726688) (← links)
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes (Q2055644) (← links)
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security (Q2055676) (← links)
- Classical vs quantum random oracles (Q2056754) (← links)
- FO-like combiners and hybrid post-quantum cryptography (Q2149826) (← links)
- Tightly secure ring-LWE based key encapsulation with short ciphertexts (Q2167708) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Post-quantum security of the Even-Mansour cipher (Q2170099) (← links)
- Online-extractability in the quantum random-oracle model (Q2170106) (← links)
- Succinct arguments in the quantum random oracle model (Q2175929) (← links)
- Tighter proofs of CCA security in the quantum random oracle model (Q2175932) (← links)
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes (Q2229273) (← links)
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications (Q2692345) (← links)
- Post-quantum verification of Fujisaki-Okamoto (Q2692346) (← links)
- Post-quantum resettably-sound zero knowledge (Q2695624) (← links)
- Quantum key-length extension (Q2695632) (← links)
- A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ (Q2988333) (← links)
- Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting (Q3297618) (← links)
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms (Q5041159) (← links)
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security (Q5041241) (← links)
- Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber (Q5087247) (← links)
- Post-quantum Security of Plain OAEP Transform (Q5087248) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501) (← links)
- \textsf{PALOMA}: binary separable Goppa-based \textsf{KEM} (Q6550587) (← links)
- From plaintext-extractability to IND-CCA security (Q6619857) (← links)
- Selective opening security in the quantum random oracle model, revisited (Q6635821) (← links)
- Post-quantum cryptosystems: open problems and solutions. Lattice-based cryptosystems (Q6644081) (← links)
- Formally verifying Kyber. Episode V: machine-checked IND-CCA security and correctness of ML-KEM in Easycrypt (Q6648215) (← links)
- Provable security against decryption failure attacks from LWE (Q6648218) (← links)