A constructive perspective on key encapsulation
From MaRDI portal
Publication:2867261
DOI10.1007/978-3-642-42001-6_16zbMATH Open1320.94062OpenAlexW167678102MaRDI QIDQ2867261FDOQ2867261
Authors: Sandro Coretti, Ueli M. Maurer, Björn Tackmann
Publication date: 10 December 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-42001-6_16
Recommendations
- Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices
- KEM combiners
- Key encapsulation mechanisms from extractable hash proof systems, revisited
- Lossy key encapsulation mechanism and its applications
- Constructing Better KEMs with Partial Message Recovery
Cited In (8)
- Public Key Cryptography - PKC 2005
- Cryptography and Coding
- Security in Communication Networks
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
- Cryptography and Coding
- Key encapsulation mechanisms from extractable hash proof systems, revisited
- Secure Cryptographic Workflow in the Standard Model
- Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
This page was built for publication: A constructive perspective on key encapsulation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2867261)