Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms - MaRDI portal

Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms

From MaRDI portal
Publication:3181027

DOI10.1007/978-3-662-53644-5_8zbMath1397.94103OpenAlexW2407452345MaRDI QIDQ3181027

Ehsan Ebrahimi Targhi, Dominique Unruh

Publication date: 22 December 2016

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53644-5_8




Related Items (38)

Memory-Tight Reductions for Practical Key Encapsulation MechanismsEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityFO-like combiners and hybrid post-quantum cryptographyTightly secure ring-LWE based key encapsulation with short ciphertextsAnonymous, robust post-quantum public key encryptionPost-quantum security of the Even-Mansour cipherOnline-extractability in the quantum random-oracle modelMultitarget Decryption Failure Attacks and Their Application to Saber and KyberPost-quantum Security of Plain OAEP TransformSuccinct arguments in the quantum random oracle modelTighter proofs of CCA security in the quantum random oracle modelGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionSéta: Supersingular Encryption from Torsion AttacksPost-quantum anonymity of KyberQCCA-secure generic transformations in the quantum random oracle modelA lightweight identification protocol based on latticesImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationKDM security for the Fujisaki-Okamoto transformations in the QROMIND-CCA security of Kyber in the quantum random oracle model, revisitedOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelRedeeming reset indifferentiability and applications to post-quantum securityFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesConstructive post-quantum reductionsOn quantum ciphertext indistinguishability, recoverability, and OAEPA one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackSecure Implementation of Lattice-Based Encryption SchemesScalable ciphertext compression techniques for post-quantum KEMs and their applicationsPost-quantum verification of Fujisaki-OkamotoPost-quantum resettably-sound zero knowledgeQuantum key-length extensionA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Analysis of error-correcting codes for lattice-based key exchangeTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingClassical misuse attacks on NIST round 2 PQC. The power of rank-based schemesTighter security proofs for GPV-IBE in the quantum random oracle model(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityClassical vs quantum random oracles



Cites Work


This page was built for publication: Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms