KEM-DEM
From MaRDI portal
Software:15626
swMATH3093MaRDI QIDQ15626FDOQ15626
Author name not available (Why is that?)
Cited In (60)
- Tag-KEM from Set Partial Domain One-Way Permutations
- Cryptography and Coding
- Adaptive trapdoor functions and chosen-ciphertext security
- Signcryption schemes with insider security in an ideal permutation model
- Efficient hybrid encryption from ID-based encryption
- One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary
- Secure Hybrid Encryption from Weakened Key Encapsulation
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- Security on Hybrid Encryption with the Tag-KEM/DEM Framework
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- On the Impossibility of Strong Encryption Over $\aleph_0$
- Information Security and Cryptology
- Some (in)sufficient conditions for secure hybrid encryption
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
- The ECCA Security of Hybrid Encryptions
- On the joint security of encryption and signature, revisited
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Public-key cryptosystems resilient to key leakage
- Certificateless hybrid signcryption
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Constructing secure hybrid encryption from key encapsulation mechanism with authenticity
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- A new Rabin-type trapdoor permutation equivalent to factoring
- Secure hybrid encryption in the standard model from hard learning problems
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack
- Efficient constructions of signcryption schemes and signcryption composability
- Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption
- Secure integration of asymmetric and symmetric encryption schemes
- New constructions of efficient simulation-sound commitments using encryption and their applications
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- Compact CCA-Secure Encryption for Messages of Arbitrary Length
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- A Practical Key Recovery Attack on Basic TCHo
- Timed-release computational secret sharing and threshold encryption
- Efficient generic constructions of timed-release encryption with pre-open capability
- Efficient Signcryption Key Encapsulation without Random Oracles
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Efficient CCA-Secure PKE from Identity-Based Techniques
- Efficient KEMs with Partial Message Recovery
- Information Security
- Secure Cryptographic Workflow in the Standard Model
- Tag-KEM/DEM: A new framework for hybrid encryption
- Probabilistic public key encryption with equality test
- Public Key Cryptography - PKC 2006
- Faster and Shorter Password-Authenticated Key Exchange
- On the security of tag-KEM for signcryption
- Theory of Cryptography
- Efficient chosen-ciphertext security via extractable hash proofs
- Identity Based Encryption Without Redundancy
This page was built for software: KEM-DEM