Anonymity of NIST PQC round 3 KEMs
From MaRDI portal
Publication:2170102
DOI10.1007/978-3-031-07082-2_20OpenAlexW3203939338MaRDI QIDQ2170102
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07082-2_20
Related Items (3)
Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ Post-quantum anonymity of Kyber ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Advances in cryptology -- ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5--9, 2010. Proceedings
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- One-round key exchange in the standard model
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- Secure integration of asymmetric and symmetric encryption schemes
- Generic authenticated key exchange in the quantum random oracle model
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model
- How to record quantum queries, and applications to quantum indifferentiability
- Faster Fully Homomorphic Encryption
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Random Oracles in a Quantum World
- Robust Encryption
- On Ideal Lattices and Learning with Errors over Rings
- Efficient Public Key Encryption Based on Ideal Lattices
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Automata, Languages and Programming
This page was built for publication: Anonymity of NIST PQC round 3 KEMs