Constructing secure hybrid encryption from key encapsulation mechanism with authenticity
From MaRDI portal
Publication:3104697
DOI10.1007/978-3-642-25516-8_13zbMATH Open1291.94155OpenAlexW2155332745MaRDI QIDQ3104697FDOQ3104697
Publication date: 16 December 2011
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25516-8_13
Recommendations
- Tag-KEM/DEM: A new framework for hybrid encryption
- Advances in Cryptology – CRYPTO 2004
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)
Cites Work
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- Using hash functions as a hedge against chosen ciphertext attack
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Some (in)sufficient conditions for secure hybrid encryption
- Efficient hybrid encryption from ID-based encryption
- Tag-KEM/DEM: A new framework for hybrid encryption
Cited In (3)
Uses Software
This page was built for publication: Constructing secure hybrid encryption from key encapsulation mechanism with authenticity
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3104697)