>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到KEM相关记录22条 . 查询时间(0.103 秒)
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Towards KEM Unification     PKE  OW-CPA  OW-Passive       font style='font-size:12px;'> 2018/6/5
This paper highlights a particular construction of a correct KEM without failures and without ciphertext expansion from any correct deterministic PKE, and presents a simple tight proof of ROM IND-CCA2...
QC-MDPC: A Timing Attack and a CCA2 KEM     post-quantum cryptography  code-based cryptography  QC-MDPC codes       font style='font-size:12px;'> 2018/3/12
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This proposal uses an iterative bi...
In this paper, we introduce Saber, a package of cryptographic primitives whose security relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first describe a secure Diffie...
KEM Combiners     secure combiners  CCA security  practical constructions       font style='font-size:12px;'> 2018/1/11
Key-encapsulation mechanisms (KEMs) are a common stepping stone for constructing public-key encryption. Secure KEMs can be built from diverse assumptions, including ones related to integer factorizati...
Round2: KEM and PKE based on GLWR     key encapsulation  public key encryption  lattice techniques       font style='font-size:12px;'> 2017/12/11
Cryptographic primitives that are secure against quantum computing are receiving growing attention with recent, steady advances in quantum computing and standardization initiatives in post-quantum cry...
With the gradual progress of NIST's post-quantum cryptography standardization, several practical post-quantum secure key encapsulation mechanism (KEM) schemes have been proposed. Generally, an IND-CCA...
CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM     KEM  lattice techniques  implementation       font style='font-size:12px;'> 2017/6/28
This paper introduces Kyber (part of the CRYSTALS -- Cryptographic Suite for Algebraic Lattices -- package that will be submitted to the NIST call for post-quantum standards), a portfolio of post-quan...
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM     PAKE  IBPAKE  IBE       font style='font-size:12px;'> 2015/12/29
In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) protocol using identitybased KEM/DEM. In IBPAKE, a client conducts authentication based on a human...
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO ’10)...
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
Efficient Certificateless KEM in the Standard Model     Efficient Certificateless  KEM  Standard Model       font style='font-size:12px;'> 2009/9/27
We give a direct construction of a certificateless key encap- sulation mechanism (KEM) in the standard model that is more ecient than the generic constructions proposed before by Huang and Wong [9]...
Efficient Certificateless KEM in the Standard Model     Efficient Certificateless  KEM  Standard Model       font style='font-size:12px;'> 2009/9/22
We give a direct construction of a certificateless key encap- sulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong [...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...