Pages that link to "Item:Q1690199"
From MaRDI portal
The following pages link to A modular analysis of the Fujisaki-Okamoto transformation (Q1690199):
Displaying 50 items.
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- Quantum lattice enumeration and tweaking discrete pruning (Q1633464) (← links)
- On the hardness of the computational ring-LWR problem and its applications (Q1633465) (← links)
- Towards practical key exchange from ordinary isogeny graphs (Q1710681) (← links)
- CSIDH: an efficient post-quantum commutative group action (Q1710683) (← links)
- DAGS: key encapsulation using dyadic GS codes (Q1755960) (← links)
- LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding (Q2034992) (← links)
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes (Q2055644) (← links)
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security (Q2055676) (← links)
- Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes (Q2055683) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols (Q2056686) (← links)
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model (Q2061910) (← links)
- On the integer polynomial learning with errors problem (Q2061918) (← links)
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM (Q2096530) (← links)
- A gapless code-based hash proof system based on RQC and its applications (Q2099170) (← links)
- Secure hybrid encryption in the standard model from hard learning problems (Q2118559) (← links)
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability (Q2119003) (← links)
- KHAPE: Asymmetric PAKE from key-hiding key exchange (Q2139655) (← links)
- Resistance of isogeny-based cryptographic implementations to a fault attack (Q2145308) (← links)
- Tightness subtleties for multi-user PKE notions (Q2149787) (← links)
- FO-like combiners and hybrid post-quantum cryptography (Q2149826) (← links)
- A new adaptive attack on SIDH (Q2152168) (← links)
- An efficient post-quantum KEM from CSIDH (Q2154465) (← links)
- A practicable timing attack against HQC and its countermeasure (Q2158241) (← links)
- The rank-based cryptography library (Q2163759) (← links)
- Performance bounds for QC-MDPC codes decoders (Q2163766) (← links)
- Tightly secure ring-LWE based key encapsulation with short ciphertexts (Q2167708) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Post-quantum security of the Even-Mansour cipher (Q2170099) (← links)
- Anonymity of NIST PQC round 3 KEMs (Q2170102) (← links)
- On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3 (Q2170104) (← links)
- Online-extractability in the quantum random-oracle model (Q2170106) (← links)
- Tighter proofs of CCA security in the quantum random oracle model (Q2175932) (← links)
- Designing efficient dyadic operations for cryptographic applications (Q2191206) (← links)
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions (Q2205895) (← links)
- Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes (Q2229273) (← links)
- Saber on ESP32 (Q2229290) (← links)
- On the supersingular GPST attack (Q2239798) (← links)
- Reproducible families of codes and cryptographic applications (Q2239799) (← links)
- Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency (Q2334442) (← links)
- ECC\(^2\): error correcting code and elliptic curve based cryptosystem (Q2663594) (← links)
- On optimizing electricity markets performance (Q2679792) (← links)
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors (Q2692341) (← links)
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications (Q2692345) (← links)
- Post-quantum verification of Fujisaki-Okamoto (Q2692346) (← links)
- A new decryption failure attack against HQC (Q2692347) (← links)
- BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU (Q3294884) (← links)
- Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting (Q3297618) (← links)