The following pages link to KEM-DEM (Q15626):
Displaying 50 items.
- Some (in)sufficient conditions for secure hybrid encryption (Q710738) (← links)
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure (Q989522) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- Timed-release computational secret sharing and threshold encryption (Q1692147) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- Secure hybrid encryption in the standard model from hard learning problems (Q2118559) (← links)
- Certificateless hybrid signcryption (Q2256393) (← links)
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (Q2267360) (← links)
- Efficient hybrid encryption from ID-based encryption (Q2267789) (← links)
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism (Q2269828) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- A new Rabin-type trapdoor permutation equivalent to factoring (Q2804935) (← links)
- On the security of tag-KEM for signcryption (Q2864185) (← links)
- New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications (Q2890001) (← links)
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model (Q2900219) (← links)
- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability (Q3059654) (← links)
- On the Joint Security of Encryption and Signature, Revisited (Q3102184) (← links)
- Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity (Q3104697) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model (Q3498394) (← links)
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks (Q3503870) (← links)
- Formal Security Treatments for Signatures from Identity-Based Encryption (Q3503884) (← links)
- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability (Q3507872) (← links)
- Adaptive Trapdoor Functions and Chosen-Ciphertext Security (Q3563861) (← links)
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs (Q3582762) (← links)
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability (Q3591413) (← links)
- Identity Based Encryption Without Redundancy (Q3593152) (← links)
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption (Q3600382) (← links)
- Chosen Ciphertext Security with Optimal Ciphertext Overhead (Q3600385) (← links)
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards (Q3608925) (← links)
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions (Q3612390) (← links)
- Secure Hybrid Encryption from Weakened Key Encapsulation (Q3612570) (← links)
- Compact CCA-Secure Encryption for Messages of Arbitrary Length (Q3615626) (← links)
- A Practical Key Recovery Attack on Basic TCHo (Q3615628) (← links)
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations (Q3623032) (← links)
- Efficient Signcryption Key Encapsulation without Random Oracles (Q3623071) (← links)
- Security on Hybrid Encryption with the Tag-KEM/DEM Framework (Q3634504) (← links)
- Efficient Constructions of Signcryption Schemes and Signcryption Composability (Q3652329) (← links)
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary (Q4912403) (← links)
- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption (Q4933224) (← links)
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions (Q4964367) (← links)
- The ECCA Security of Hybrid Encryptions (Q5056044) (← links)
- Probabilistic Public Key Encryption with Equality Test (Q5189445) (← links)
- Efficient CCA-Secure PKE from Identity-Based Techniques (Q5189446) (← links)
- On the Impossibility of Strong Encryption Over $\aleph_0$ (Q5323010) (← links)
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM (Q5385726) (← links)
- Faster and Shorter Password-Authenticated Key Exchange (Q5445527) (← links)
- Efficient KEMs with Partial Message Recovery (Q5447520) (← links)
- Secure Cryptographic Workflow in the Standard Model (Q5458291) (← links)