Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
From MaRDI portal
Publication:2900243
DOI10.1007/978-3-642-30057-8_34zbMATH Open1300.94083OpenAlexW2205077195MaRDI QIDQ2900243FDOQ2900243
Authors: Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
Publication date: 20 July 2012
Published in: Public Key Cryptography – PKC 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-30057-8_34
Recommendations
- Key encapsulation mechanisms from extractable hash proof systems, revisited
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
- Advances in Cryptology – CRYPTO 2004
- A constructive perspective on key encapsulation
Cited In (3)
This page was built for publication: Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2900243)