Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
From MaRDI portal
Publication:2900243
Recommendations
- Key encapsulation mechanisms from extractable hash proof systems, revisited
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
- Advances in Cryptology – CRYPTO 2004
- A constructive perspective on key encapsulation
Cited in
(3)
This page was built for publication: Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2900243)