Results 301 to 310 of about 6,099,057 (328)
Some of the next articles are maybe not open access.

An Error Correction Approach to Memristors PUF-based Key Encapsulation

Coins, 2021
A novel Physically Unclonable Functions (PUF)-based keyless encapsulation protocol was recently proposed by our team that does not rely on cryptographic keys and directly encrypts the messages using the unique responses extracted from embedded ReRAM PUFs
A. Korenda   +3 more
semanticscholar   +1 more source

A Survey of Post Quantum Key Encapsulation Mechanism

2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI)
Classical public-key cryptographic algorithms like the RSA algorithm and Diffie-Hellman are used to secure internet communications. However, the emergence of quantum computers poses a significant threat to these established algorithms, potentially ...
Manjiri Harmalkar   +2 more
semanticscholar   +1 more source

A Constructive Perspective on Key Encapsulation

2013
A key-encapsulation mechanism (KEM) is a cryptographic primitive that allows anyone in possession of some party’s public key to securely transmit a key to that party. A KEM can be viewed as a key-exchange protocol in which only a single message is transmitted; the main application is in combination with symmetric encryption to achieve public-key ...
Sandro Coretti   +2 more
openaire   +2 more sources

Identification Schemes from Key Encapsulation Mechanisms

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
We propose a generic way for deriving an identification (ID) scheme secure against concurrent man-in-the-middle attacks from a key encapsulation mechanism (KEM) secure against chosen ciphertext attacks on one-wayness (oneway-CCA). Then we give a concrete one-way-CCA secure KEM based on the Computational Diffie-Hellman (CDH) assumption.
Hiroaki Anada, Seiko Arita
openaire   +2 more sources

A Configurable ML-KEM/Kyber Key-Encapsulation Hardware Accelerator Architecture

IEEE Transactions on Circuits and Systems - II - Express Briefs
The development of quantum computers has created a need for new Post-Quantum cryptography (PQC) to address the potential threat to the current cryptography systems.
Hyunseon Kim   +3 more
semanticscholar   +1 more source

Using Key Encapsulation Mechanism (KEM) Algorithms in the Cryptographic Message Syntax (CMS)

Request for Comments
The Cryptographic Message Syntax (CMS) supports key transport and key agreement algorithms. In recent years, cryptographers have been specifying Key Encapsulation Mechanism (KEM) algorithms, including quantum-secure KEM algorithms.
R. Housley, John Gray, Tomofumi Okubo
semanticscholar   +1 more source

DAGS: Reloaded Revisiting Dyadic Key Encapsulation

2019
In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to NIST’s standardization call for the key exchange/encryption functionalities. In particular, we modify the algorithms for key generation, encapsulation and decapsulation to fit an alternative KEM framework, and we present a new ...
Barreto, Paulo S.   +14 more
openaire   +5 more sources

Generic Certificateless Key Encapsulation Mechanism

2007
We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code.
Qiong Huang, Duncan S. Wong
openaire   +2 more sources

Efficient Key Encapsulation to Multiple Parties

2005
We present the notion of an mKEM, which is a Key Encapsulation Mechanism (KEM) which takes multiple public keys as input. This has applications where one wishes to encrypt a single large document to a set of multiple recipients, as when one sends an encrypted email to more than one person.
openaire   +2 more sources

Implementation of Supersingular Isogeny-Based Diffie-Hellman and Key Encapsulation Using an Efficient Scheduling

IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2020
Isogeny-based cryptography is one of the promising post-quantum candidates mainly because of its smaller public key length. Due to its high computational cost, efficient implementations are significantly important.
Mohammad-Hossein Farzam   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy