Results 311 to 320 of about 6,099,057 (328)
Some of the next articles are maybe not open access.

A Key Encapsulation Mechanism for NTRU

2005
In this article we present a key encapsulation mechanism (KEM) for NTRU. The KEM is more efficient than a naive approach based on NAEP and resistant against the decryption failures that may occur when using NTRU. We also introduce plaintext awareness for KEMs and use it to tighten a security result by Dent.
openaire   +2 more sources

Compact and Simple RLWE Based Key Encapsulation Mechanism

2019
In this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quantum standardization project candidates. Our scheme is based on NewHope, thus it is simple and has fast implementation while it is making use of smaller key sizes and easily changeable security level advantages of Kyber .
Alkım E., Bilgin Y.A., Cenk M.
openaire   +3 more sources

The Kurosawa–Desmedt key encapsulation is not chosen-ciphertext secure

Information Processing Letters, 2009
At CRYPTO 2004, Kurosawa and Desmedt presented a new hybrid encryption scheme that is chosen-ciphertext (CCA2) secure in the standard model. Until now it was unknown if the key encapsulation part of the Kurosawa-Desmedt scheme by itself is still CCA2-secure or not.
Geol Choi, S.   +6 more
openaire   +2 more sources

SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits

IACR Cryptology ePrint Archive, 2023
J. Cheon   +3 more
semanticscholar   +1 more source

Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited

2014
While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is provably secure against chosen ciphertext attacks (namely, IND-CCA-secure), its associated key encapsulation mechanism (KEM) is not IND-CCA-secure (Herranz et al. 2006, Choi et al. 2009).
Le Trieu Phong, Kaoru Kurosawa
openaire   +2 more sources

Key Encapsulation Mechanism from Multilinear Maps

2017
The key encapsulation mechanism (KEM) and the data encapsulation mechanism (DEM) form a hybrid encryption, which effectively solves the problem of low efficiency of public key cryptography and key distribution problems in symmetric encryption system.
Wenjun Sun   +3 more
openaire   +2 more sources

High-speed SABER key encapsulation mechanism in 65nm CMOS

Journal of Cryptographic Engineering, 2023
Malik Imran   +4 more
semanticscholar   +1 more source

A new post-quantum multivariate polynomial public key encapsulation algorithm

Quantum Information Processing, 2022
Randy Kuang   +2 more
semanticscholar   +1 more source

NEON SIKE: Supersingular Isogeny Key Encapsulation on ARMv7

2018
We present a highly-optimized implementation of Supersingular Isogeny Key Encapsulation (SIKE) mechanism on ARMv7 family of processors. We exploit the state-of-the-art implementation techniques and processor capabilities to efficiently develop post-quantum key encapsulation scheme on 32-bit ARMv7 Cortex-A processors.
Amir Jalali   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy