Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms (Q2900243)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms |
scientific article; zbMATH DE number 6059202
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms |
scientific article; zbMATH DE number 6059202 |
Statements
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms (English)
0 references
20 July 2012
0 references
key encapsulation mechanism
0 references
constrained CCA security
0 references
bounded CCA security
0 references
hash proof system
0 references
0.8356387615203857
0 references
0.8326132893562317
0 references
0.8159474730491638
0 references
0.7827412486076355
0 references
0.7730167508125305
0 references