Results 301 to 310 of about 6,099,057 (328)
Some of the next articles are maybe not open access.
An Error Correction Approach to Memristors PUF-based Key Encapsulation
Coins, 2021A novel Physically Unclonable Functions (PUF)-based keyless encapsulation protocol was recently proposed by our team that does not rely on cryptographic keys and directly encrypts the messages using the unique responses extracted from embedded ReRAM PUFs
A. Korenda +3 more
semanticscholar +1 more source
A Survey of Post Quantum Key Encapsulation Mechanism
2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI)Classical public-key cryptographic algorithms like the RSA algorithm and Diffie-Hellman are used to secure internet communications. However, the emergence of quantum computers poses a significant threat to these established algorithms, potentially ...
Manjiri Harmalkar +2 more
semanticscholar +1 more source
A Constructive Perspective on Key Encapsulation
2013A key-encapsulation mechanism (KEM) is a cryptographic primitive that allows anyone in possession of some party’s public key to securely transmit a key to that party. A KEM can be viewed as a key-exchange protocol in which only a single message is transmitted; the main application is in combination with symmetric encryption to achieve public-key ...
Sandro Coretti +2 more
openaire +2 more sources
Identification Schemes from Key Encapsulation Mechanisms
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011We propose a generic way for deriving an identification (ID) scheme secure against concurrent man-in-the-middle attacks from a key encapsulation mechanism (KEM) secure against chosen ciphertext attacks on one-wayness (oneway-CCA). Then we give a concrete one-way-CCA secure KEM based on the Computational Diffie-Hellman (CDH) assumption.
Hiroaki Anada, Seiko Arita
openaire +2 more sources
A Configurable ML-KEM/Kyber Key-Encapsulation Hardware Accelerator Architecture
IEEE Transactions on Circuits and Systems - II - Express BriefsThe development of quantum computers has created a need for new Post-Quantum cryptography (PQC) to address the potential threat to the current cryptography systems.
Hyunseon Kim +3 more
semanticscholar +1 more source
Using Key Encapsulation Mechanism (KEM) Algorithms in the Cryptographic Message Syntax (CMS)
Request for CommentsThe Cryptographic Message Syntax (CMS) supports key transport and key agreement algorithms. In recent years, cryptographers have been specifying Key Encapsulation Mechanism (KEM) algorithms, including quantum-secure KEM algorithms.
R. Housley, John Gray, Tomofumi Okubo
semanticscholar +1 more source
DAGS: Reloaded Revisiting Dyadic Key Encapsulation
2019In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to NIST’s standardization call for the key exchange/encryption functionalities. In particular, we modify the algorithms for key generation, encapsulation and decapsulation to fit an alternative KEM framework, and we present a new ...
Barreto, Paulo S. +14 more
openaire +5 more sources
Generic Certificateless Key Encapsulation Mechanism
2007We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code.
Qiong Huang, Duncan S. Wong
openaire +2 more sources
Efficient Key Encapsulation to Multiple Parties
2005We present the notion of an mKEM, which is a Key Encapsulation Mechanism (KEM) which takes multiple public keys as input. This has applications where one wishes to encrypt a single large document to a set of multiple recipients, as when one sends an encrypted email to more than one person.
openaire +2 more sources
IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2020
Isogeny-based cryptography is one of the promising post-quantum candidates mainly because of its smaller public key length. Due to its high computational cost, efficient implementations are significantly important.
Mohammad-Hossein Farzam +2 more
semanticscholar +1 more source
Isogeny-based cryptography is one of the promising post-quantum candidates mainly because of its smaller public key length. Due to its high computational cost, efficient implementations are significantly important.
Mohammad-Hossein Farzam +2 more
semanticscholar +1 more source

