Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
KEM-DEM - MaRDI portal

KEM-DEM

From MaRDI portal
Software:15626



swMATH3093MaRDI QIDQ15626


No author found.





Related Items (60)

New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their ApplicationsAnonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard ModelThe ECCA Security of Hybrid EncryptionsSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageOn the Impossibility of Strong Encryption Over $\aleph_0$Authenticated Key Exchange and Key Encapsulation in the Standard ModelConstruction of a Hybrid HIBE Protocol Secure Against Adaptive AttacksFormal Security Treatments for Signatures from Identity-Based EncryptionTimed-release computational secret sharing and threshold encryptionRevisiting the Security Model for Timed-Release Encryption with Pre-open CapabilitySecure integration of asymmetric and symmetric encryption schemesTag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEMAdaptive Trapdoor Functions and Chosen-Ciphertext SecurityOne-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained AdversaryTag-KEM/DEM: A new framework for hybrid encryptionSigncryption schemes with insider security in an ideal permutation modelCertificateless hybrid signcryptionChameleon-Hashes with Ephemeral TrapdoorsEfficient Chosen-Ciphertext Security via Extractable Hash ProofsA new and improved paradigm for hybrid encryption secure against chosen-ciphertext attackToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionGeneric Construction of Hybrid Public Key Traitor Tracing with Full-Public-TraceabilityEfficient hybrid encryption from ID-based encryptionSome (in)sufficient conditions for secure hybrid encryptionEfficient chosen-ciphertext secure certificateless threshold key encapsulation mechanismIdentity Based Encryption Without RedundancyProbabilistic Public Key Encryption with Equality TestEfficient CCA-Secure PKE from Identity-Based TechniquesChosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-HellmanEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionChosen Ciphertext Security with Optimal Ciphertext OverheadTag-KEM from Set Partial Domain One-Way PermutationsThe Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureEfficient Generic Constructions of Timed-Release Encryption with Pre-open CapabilityFaster and Shorter Password-Authenticated Key ExchangeEfficient KEMs with Partial Message RecoveryEfficient Chosen-Ciphertext Secure Identity-Based Encryption with WildcardsTweaking TBE/IBE to PKE Transforms with Chameleon Hash FunctionsSecure Hybrid Encryption from Weakened Key EncapsulationCompact CCA-Secure Encryption for Messages of Arbitrary LengthA Practical Key Recovery Attack on Basic TCHoA New Rabin-type Trapdoor Permutation Equivalent to FactoringSecure Cryptographic Workflow in the Standard ModelCCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric EncryptionAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsEfficient Signcryption Key Encapsulation without Random OraclesPost-Quantum Constant-Round Group Key Exchange from Static AssumptionsCryptography and CodingPublic-Key Cryptosystems Resilient to Key LeakageInformation Security and CryptologySecurity on Hybrid Encryption with the Tag-KEM/DEM FrameworkPublic Key Cryptography - PKC 2006On the Joint Security of Encryption and Signature, RevisitedConstructing Secure Hybrid Encryption from Key Encapsulation Mechanism with AuthenticityDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesTheory of CryptographyEfficient Constructions of Signcryption Schemes and Signcryption ComposabilityInformation SecurityOn the Security of Tag-KEM for SigncryptionSecure hybrid encryption in the standard model from hard learning problems


This page was built for software: KEM-DEM