Results 11 to 20 of about 6,099,057 (328)
Standard Lattice-Based Key Encapsulation on Embedded Devices [PDF]
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al.
James Howe +3 more
doaj +6 more sources
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
In this paper, we introduce Scabbard, a suite of post-quantum keyencapsulation mechanisms. Our suite contains three different schemes Florete, Espada, and Sable based on the hardness of module- or ring-learning with rounding problem.
Jose Maria Bermudo Mera +3 more
doaj +5 more sources
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism [PDF]
The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum ...
M. Nosouhi +6 more
semanticscholar +3 more sources
From Key Encapsulation to Authenticated Group Key Establishment—A Compiler for Post-Quantum Primitives † [PDF]
Assuming the availability of an existentially unforgeable signature scheme and an (IND- CCA secure) key encapsulation mechanism, we present a generic construction for group key establishment. The construction is designed with existing proposals for post-quantum cryptography in mind.
Persichetti E +2 more
europepmc +5 more sources
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transition applications from classical to quantum-resistant solutions.
Nina Bindel +4 more
semanticscholar +4 more sources
Key encapsulation mechanism based on polar codes
This paper introduces a key encapsulation mechanism based on polar codes, called as KEM‐PC, with secure and efficient key generation, encapsulation and decapsulation algorithms.
Reza Hooshmand, Mahdi Khoshfekr
doaj +2 more sources
DAGS: Key encapsulation using dyadic GS codes [PDF]
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +7 more sources
Efficient identity-based key encapsulation to multiple parties [PDF]
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties.
Barbosa, Manuel, Farshim, P.
core +5 more sources
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices [PDF]
We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems.
Joohee Lee +4 more
doaj +2 more sources
Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements
Key exchange mechanisms are foundational to secure communication, yet traditional methods face challenges from quantum computing. The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a post-quantum cryptographic key exchange protocol with ...
Naya Nagy +7 more
doaj +2 more sources

