Pages that link to "Item:Q1653108"
From MaRDI portal
The following pages link to Tightly-secure key-encapsulation mechanism in the quantum random oracle model (Q1653108):
Displaying 42 items.
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited (Q775952) (← links)
- KEM combiners (Q1749281) (← links)
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity (Q2043417) (← links)
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes (Q2055644) (← links)
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security (Q2055676) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model (Q2061910) (← links)
- On the integer polynomial learning with errors problem (Q2061918) (← links)
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability (Q2119003) (← links)
- On tight quantum security of HMAC and NMAC in the quantum random oracle model (Q2120095) (← links)
- A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs (Q2128576) (← links)
- FO-like combiners and hybrid post-quantum cryptography (Q2149826) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Anonymity of NIST PQC round 3 KEMs (Q2170102) (← links)
- On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3 (Q2170104) (← links)
- Tighter proofs of CCA security in the quantum random oracle model (Q2175932) (← links)
- SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model (Q2177667) (← links)
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge (Q2214958) (← links)
- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model (Q2302136) (← links)
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors (Q2692341) (← links)
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications (Q2692345) (← links)
- Post-quantum verification of Fujisaki-Okamoto (Q2692346) (← links)
- (Q2950582) (← links)
- Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting (Q3297618) (← links)
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms (Q5041159) (← links)
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security (Q5041241) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501) (← links)
- KDM security for the Fujisaki-Okamoto transformations in the QROM (Q6113959) (← links)
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model (Q6157502) (← links)
- Tight adaptive reprogramming in the QROM (Q6157507) (← links)
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates (Q6157511) (← links)
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack (Q6169491) (← links)
- Instantiability of classical random-oracle-model encryption transforms (Q6175981) (← links)
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform (Q6175985) (← links)
- Tightly secure lattice identity-based signature in the quantum random oracle model (Q6535493) (← links)
- Power of randomness recovery: tighter CCA-secure KEM in the QROM (Q6575065) (← links)
- Tighter security for generic authenticated key exchange in the QROM (Q6604883) (← links)
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query (Q6604884) (← links)
- \textsf{SMAUG}: pushing lattice-based key encapsulation mechanisms to the limits (Q6620040) (← links)
- Selective opening security in the quantum random oracle model, revisited (Q6635821) (← links)
- Formally verifying Kyber. Episode V: machine-checked IND-CCA security and correctness of ML-KEM in Easycrypt (Q6648215) (← links)
- Provable security against decryption failure attacks from LWE (Q6648218) (← links)