KEM combiners
From MaRDI portal
Publication:1749281
DOI10.1007/978-3-319-76578-5_7zbMath1385.94037OpenAlexW4239555993MaRDI QIDQ1749281
Federico Giacon, Felix Heuer, Bertram Poettering
Publication date: 16 May 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-76578-5_7
Related Items (6)
FO-like combiners and hybrid post-quantum cryptography ⋮ On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3 ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ On secure ratcheting with immediate decryption ⋮ Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
This page was built for publication: KEM combiners