Results 311 to 320 of about 6,099,057 (328)
Some of the next articles are maybe not open access.
A Key Encapsulation Mechanism for NTRU
2005In this article we present a key encapsulation mechanism (KEM) for NTRU. The KEM is more efficient than a naive approach based on NAEP and resistant against the decryption failures that may occur when using NTRU. We also introduce plaintext awareness for KEMs and use it to tighten a security result by Dent.
openaire +2 more sources
Compact and Simple RLWE Based Key Encapsulation Mechanism
2019In this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quantum standardization project candidates. Our scheme is based on NewHope, thus it is simple and has fast implementation while it is making use of smaller key sizes and easily changeable security level advantages of Kyber .
Alkım E., Bilgin Y.A., Cenk M.
openaire +3 more sources
The Kurosawa–Desmedt key encapsulation is not chosen-ciphertext secure
Information Processing Letters, 2009At CRYPTO 2004, Kurosawa and Desmedt presented a new hybrid encryption scheme that is chosen-ciphertext (CCA2) secure in the standard model. Until now it was unknown if the key encapsulation part of the Kurosawa-Desmedt scheme by itself is still CCA2-secure or not.
Geol Choi, S. +6 more
openaire +2 more sources
SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits
IACR Cryptology ePrint Archive, 2023J. Cheon +3 more
semanticscholar +1 more source
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited
2014While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is provably secure against chosen ciphertext attacks (namely, IND-CCA-secure), its associated key encapsulation mechanism (KEM) is not IND-CCA-secure (Herranz et al. 2006, Choi et al. 2009).
Le Trieu Phong, Kaoru Kurosawa
openaire +2 more sources
Key Encapsulation Mechanism from Multilinear Maps
2017The key encapsulation mechanism (KEM) and the data encapsulation mechanism (DEM) form a hybrid encryption, which effectively solves the problem of low efficiency of public key cryptography and key distribution problems in symmetric encryption system.
Wenjun Sun +3 more
openaire +2 more sources
High-speed SABER key encapsulation mechanism in 65nm CMOS
Journal of Cryptographic Engineering, 2023Malik Imran +4 more
semanticscholar +1 more source
A new post-quantum multivariate polynomial public key encapsulation algorithm
Quantum Information Processing, 2022Randy Kuang +2 more
semanticscholar +1 more source
NEON SIKE: Supersingular Isogeny Key Encapsulation on ARMv7
2018We present a highly-optimized implementation of Supersingular Isogeny Key Encapsulation (SIKE) mechanism on ARMv7 family of processors. We exploit the state-of-the-art implementation techniques and processor capabilities to efficiently develop post-quantum key encapsulation scheme on 32-bit ARMv7 Cortex-A processors.
Amir Jalali +2 more
openaire +2 more sources

