Constructing secure hybrid encryption from key encapsulation mechanism with authenticity
From MaRDI portal
Publication:3104697
Recommendations
- Tag-KEM/DEM: A new framework for hybrid encryption
- Advances in Cryptology – CRYPTO 2004
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)
Cites work
- scientific article; zbMATH DE number 1617925 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Efficient hybrid encryption from ID-based encryption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Secure integration of asymmetric and symmetric encryption schemes
- Some (in)sufficient conditions for secure hybrid encryption
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Tag-KEM/DEM: A new framework for hybrid encryption
- Using hash functions as a hedge against chosen ciphertext attack
Cited in
(4)
This page was built for publication: Constructing secure hybrid encryption from key encapsulation mechanism with authenticity
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3104697)