More efficient post-quantum KEMTLS with pre-distributed public keys
From MaRDI portal
Publication:2146154
Recommendations
- Efficient circuit-size independent public key encryption with KDM security
- Post-quantum static-static key agreement using multiple protocol instances
- Anonymous, robust post-quantum public key encryption
- A practical post-quantum public-key cryptosystem based on spLWE
- Efficient public-key cryptography in the presence of key leakage
- Efficient public-key operation in multivariate schemes
- Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Better preprocessing for secure multiparty computation
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- A cryptographic analysis of the TLS 1.3 handshake protocol
- An efficient protocol for authenticated key agreement
- Benchmarking post-quantum cryptography in TLS
- Composability and On-Line Deniability of Authentication
- Cryptographic extraction and key derivation: the HKDF scheme
- Generic forward-secure key agreement without signatures
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Post-quantum key exchange for the Internet and the open quantum safe project
- Stronger Security of Authenticated Key Exchange
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Transitioning to a quantum-resistant public key infrastructure
Cited in
(7)- KEMTLS with delayed forward identity protection in (almost) a single round trip
- QUIC protocol with post-quantum authentication
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
- Post-quantum hybrid KEMTLS performance in simulated and real network environments
- Modular design of KEM-based authenticated key exchange
- Benchmarking post-quantum cryptography in TLS
- Implementing and measuring \textsf{KEMTLS}
This page was built for publication: More efficient post-quantum KEMTLS with pre-distributed public keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2146154)