KEM-DEM
From MaRDI portal
Cited in
(64)- Cryptography and Coding
- Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption
- Tag-KEM from Set Partial Domain One-Way Permutations
- Information Security
- On the joint security of encryption and signature, revisited
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Tag-KEM/DEM: A new framework for hybrid encryption
- Secure Cryptographic Workflow in the Standard Model
- Efficient Signcryption Key Encapsulation without Random Oracles
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
- On the security of tag-KEM for signcryption
- Faster and Shorter Password-Authenticated Key Exchange
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- Efficient chosen-ciphertext security via extractable hash proofs
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Secure hybrid encryption in the standard model from hard learning problems
- On the Impossibility of Strong Encryption Over $\aleph_0$
- Efficient constructions of signcryption schemes and signcryption composability
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
- Timed-release computational secret sharing and threshold encryption
- Public-key cryptosystems resilient to key leakage
- Information Security and Cryptology
- Adaptive trapdoor functions and chosen-ciphertext security
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Certificateless hybrid signcryption
- Signcryption schemes with insider security in an ideal permutation model
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- A new Rabin-type trapdoor permutation equivalent to factoring
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Probabilistic public key encryption with equality test
- HMQV
- NESSIE
- NAXOS
- Efficient hybrid encryption from ID-based encryption
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Theory of Cryptography
- Saber
- Constructing secure hybrid encryption from key encapsulation mechanism with authenticity
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
- Some (in)sufficient conditions for secure hybrid encryption
- Compact CCA-Secure Encryption for Messages of Arbitrary Length
- A Practical Key Recovery Attack on Basic TCHo
- One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary
- Identity Based Encryption Without Redundancy
- Efficient KEMs with Partial Message Recovery
- Public Key Cryptography - PKC 2006
- The ECCA Security of Hybrid Encryptions
- Efficient CCA-Secure PKE from Identity-Based Techniques
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
- Secure integration of asymmetric and symmetric encryption schemes
- Security on Hybrid Encryption with the Tag-KEM/DEM Framework
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- Efficient generic constructions of timed-release encryption with pre-open capability
- Secure Hybrid Encryption from Weakened Key Encapsulation
- New constructions of efficient simulation-sound commitments using encryption and their applications
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
This page was built for software: KEM-DEM