KEM-DEM
From MaRDI portal
Software:15626
No author found.
Related Items (60)
New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications ⋮ Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model ⋮ The ECCA Security of Hybrid Encryptions ⋮ Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message ⋮ On the Impossibility of Strong Encryption Over $\aleph_0$ ⋮ Authenticated Key Exchange and Key Encapsulation in the Standard Model ⋮ Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks ⋮ Formal Security Treatments for Signatures from Identity-Based Encryption ⋮ Timed-release computational secret sharing and threshold encryption ⋮ Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability ⋮ Secure integration of asymmetric and symmetric encryption schemes ⋮ Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM ⋮ Adaptive Trapdoor Functions and Chosen-Ciphertext Security ⋮ One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ Signcryption schemes with insider security in an ideal permutation model ⋮ Certificateless hybrid signcryption ⋮ Chameleon-Hashes with Ephemeral Trapdoors ⋮ Efficient Chosen-Ciphertext Security via Extractable Hash Proofs ⋮ A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack ⋮ Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption ⋮ Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Some (in)sufficient conditions for secure hybrid encryption ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Identity Based Encryption Without Redundancy ⋮ Probabilistic Public Key Encryption with Equality Test ⋮ Efficient CCA-Secure PKE from Identity-Based Techniques ⋮ Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman ⋮ Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption ⋮ Chosen Ciphertext Security with Optimal Ciphertext Overhead ⋮ Tag-KEM from Set Partial Domain One-Way Permutations ⋮ The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure ⋮ Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability ⋮ Faster and Shorter Password-Authenticated Key Exchange ⋮ Efficient KEMs with Partial Message Recovery ⋮ Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards ⋮ Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions ⋮ Secure Hybrid Encryption from Weakened Key Encapsulation ⋮ Compact CCA-Secure Encryption for Messages of Arbitrary Length ⋮ A Practical Key Recovery Attack on Basic TCHo ⋮ A New Rabin-type Trapdoor Permutation Equivalent to Factoring ⋮ Secure Cryptographic Workflow in the Standard Model ⋮ CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption ⋮ An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations ⋮ Efficient Signcryption Key Encapsulation without Random Oracles ⋮ Post-Quantum Constant-Round Group Key Exchange from Static Assumptions ⋮ Cryptography and Coding ⋮ Public-Key Cryptosystems Resilient to Key Leakage ⋮ Information Security and Cryptology ⋮ Security on Hybrid Encryption with the Tag-KEM/DEM Framework ⋮ Public Key Cryptography - PKC 2006 ⋮ On the Joint Security of Encryption and Signature, Revisited ⋮ Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity ⋮ Direct chosen-ciphertext secure identity-based key encapsulation without random oracles ⋮ Theory of Cryptography ⋮ Efficient Constructions of Signcryption Schemes and Signcryption Composability ⋮ Information Security ⋮ On the Security of Tag-KEM for Signcryption ⋮ Secure hybrid encryption in the standard model from hard learning problems
This page was built for software: KEM-DEM