Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptography and Coding - MaRDI portal

Cryptography and Coding

From MaRDI portal
Publication:5428158

DOI10.1007/b93924zbMath1123.94336OpenAlexW2478032277MaRDI QIDQ5428158

Alexander W. Dent

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b93924




Related Items (32)

On CCA-Secure Somewhat Homomorphic EncryptionMemory-Tight Reductions for Practical Key Encapsulation MechanismsDecryption Failure Is More Likely After SuccessRogue Decryption Failures: Reconciling AE Robustness NotionsSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageTightly secure ring-LWE based key encapsulation with short ciphertextsMultitarget Decryption Failure Attacks and Their Application to Saber and KyberGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionPost-quantum anonymity of KyberOffline Assisted Group Key ExchangeImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationGeneric constructions of identity-based and certificateless kEMsOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesA one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackFailing gracefully: decryption failures and the Fujisaki-Okamoto transformWildcarded identity-based encryptionTighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle modelScalable ciphertext compression techniques for post-quantum KEMs and their applicationsBI-NTRU Encryption Schemes: Two New Secure Variants of NTRUNTRU prime: reducing attack surface at low costEfficient Certificateless KEM in the Standard ModelTag-KEM/DEM: A new framework for hybrid encryptionSigncryption schemes with insider security in an ideal permutation modelSubtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?Efficient KEMs with Partial Message RecoveryRandomness Reuse: Extensions and Improvements(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityGeneric authenticated key exchange in the quantum random oracle modelQCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle modelSeparate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability







This page was built for publication: Cryptography and Coding