A constructive perspective on key encapsulation
From MaRDI portal
Publication:2867261
Recommendations
- Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices
- KEM combiners
- Key encapsulation mechanisms from extractable hash proof systems, revisited
- Lossy key encapsulation mechanism and its applications
- Constructing Better KEMs with Partial Message Recovery
Cited in
(13)- Key encapsulation mechanisms from extractable hash proof systems, revisited
- Secure Cryptographic Workflow in the Standard Model
- Cryptography and Coding
- Security in Communication Networks
- Lossy key encapsulation mechanism and its applications
- Public Key Cryptography - PKC 2005
- Modular design of KEM-based authenticated key exchange
- Cryptography and Coding
- KEM combiners
- Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
- Understanding and constructing AKE via double-key key encapsulation mechanism
- Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
This page was built for publication: A constructive perspective on key encapsulation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2867261)