KEM-DEM
From MaRDI portal
Software:15626
swMATH3093MaRDI QIDQ15626FDOQ15626
Author name not available (Why is that?)
Cited In (60)
- Signcryption schemes with insider security in an ideal permutation model
- Efficient hybrid encryption from ID-based encryption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- Efficient Constructions of Signcryption Schemes and Signcryption Composability
- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability
- Security on Hybrid Encryption with the Tag-KEM/DEM Framework
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
- Formal Security Treatments for Signatures from Identity-Based Encryption
- Public-Key Cryptosystems Resilient to Key Leakage
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- On the Impossibility of Strong Encryption Over $\aleph_0$
- Information Security and Cryptology
- Some (in)sufficient conditions for secure hybrid encryption
- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
- The ECCA Security of Hybrid Encryptions
- Adaptive Trapdoor Functions and Chosen-Ciphertext Security
- Certificateless hybrid signcryption
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- A new Rabin-type trapdoor permutation equivalent to factoring
- Secure hybrid encryption in the standard model from hard learning problems
- Authenticated Key Exchange and Key Encapsulation in the Standard Model
- Probabilistic Public Key Encryption with Equality Test
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Secure integration of asymmetric and symmetric encryption schemes
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- On the Joint Security of Encryption and Signature, Revisited
- Compact CCA-Secure Encryption for Messages of Arbitrary Length
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- A Practical Key Recovery Attack on Basic TCHo
- Timed-release computational secret sharing and threshold encryption
- Efficient Signcryption Key Encapsulation without Random Oracles
- Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Efficient CCA-Secure PKE from Identity-Based Techniques
- Efficient KEMs with Partial Message Recovery
- Information Security
- Secure Cryptographic Workflow in the Standard Model
- Chameleon-Hashes with Ephemeral Trapdoors
- Tag-KEM/DEM: A new framework for hybrid encryption
- Public Key Cryptography - PKC 2006
- Faster and Shorter Password-Authenticated Key Exchange
- On the security of tag-KEM for signcryption
- Theory of Cryptography
- New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications
- Identity Based Encryption Without Redundancy
- Tag-KEM from Set Partial Domain One-Way Permutations
- Cryptography and Coding
This page was built for software: KEM-DEM