Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
From MaRDI portal
Publication:2302136
Recommendations
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model
- Tighter proofs of CCA security in the quantum random oracle model
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
- Generic authenticated key exchange in the quantum random oracle model
Cited in
(30)- Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
- Implicit rejection in Fujisaki-Okamoto: framework and a novel realization
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model
- Generic authenticated key exchange in the quantum random oracle model
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
- Tighter security for generic authenticated key exchange in the QROM
- Formally verifying Kyber. Episode V: machine-checked IND-CCA security and correctness of ML-KEM in Easycrypt
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Power of randomness recovery: tighter CCA-secure KEM in the QROM
- Tighter proofs of CCA security in the quantum random oracle model
- scientific article; zbMATH DE number 6492475 (Why is no real title available?)
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- QCCA-secure generic transformations in the quantum random oracle model
- (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model
- An injectivity analysis of Crystals-Kyber and implications on quantum security
- KEM combiners
- Instantiability of classical random-oracle-model encryption transforms
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
- IND-CCA security of Kyber in the quantum random oracle model, revisited
- On the security of NTS-KEM in the quantum random oracle model
- Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model
This page was built for publication: Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2302136)