Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
From MaRDI portal
Publication:2119003
DOI10.1007/978-3-030-45724-2_1zbMath1492.94065OpenAlexW3003616245MaRDI QIDQ2119003
Publication date: 23 March 2022
Full work available at URL: http://hdl.handle.net/20.500.11850/392433
Related Items (13)
FO-like combiners and hybrid post-quantum cryptography ⋮ On the concrete security of TLS 1.3 PSK mode ⋮ Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA ⋮ Let attackers program ideal models: modularity and composability for adaptive compromise ⋮ A lightweight identification protocol based on lattices ⋮ Redeeming reset indifferentiability and applications to post-quantum security ⋮ On quantum ciphertext indistinguishability, recoverability, and OAEP ⋮ A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ Acyclicity programming for sigma-protocols ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Quantifying the security cost of migrating protocols to practice ⋮ Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
Uses Software
Cites Work
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Careful with Composition: Limitations of the Indifferentiability Framework
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Resource-Restricted Indifferentiability
- Salvaging Indifferentiability in a Multi-stage Setting
- Cryptography and Coding
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Theory of Cryptography
This page was built for publication: Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability