Anonymity of NIST PQC round 3 KEMs
From MaRDI portal
Publication:2170102
DOI10.1007/978-3-031-07082-2_20OpenAlexW3203939338MaRDI QIDQ2170102FDOQ2170102
Authors: Keita Xagawa
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07082-2_20
Recommendations
- Anonymous, robust post-quantum public key encryption
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- On the security of NTS-KEM in the quantum random oracle model
- KEM combiners
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
Cites Work
- Faster fully homomorphic encryption
- On ideal lattices and learning with errors over rings
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Robust Encryption
- Efficient public key encryption based on ideal lattices (extended abstract)
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Title not available (Why is that?)
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Advances in Cryptology - EUROCRYPT 2004
- Automata, Languages and Programming
- Random oracles in a quantum world
- One-round key exchange in the standard model
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Advances in cryptology -- ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5--9, 2010. Proceedings
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- A modular analysis of the Fujisaki-Okamoto transformation
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model
- Generic authenticated key exchange in the quantum random oracle model
- How to record quantum queries, and applications to quantum indifferentiability
Cited In (3)
This page was built for publication: Anonymity of NIST PQC round 3 KEMs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2170102)