Results 1 to 10 of about 131,074 (313)

Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [PDF]

open access: goldPeerJ Computer Science, 2023
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method.
Kübra Seyhan, Sedat Akleylek
doaj   +4 more sources

Key encapsulation mechanism based on polar codes

open access: goldIET Communications, 2022
This paper introduces a key encapsulation mechanism based on polar codes, called as KEM‐PC, with secure and efficient key generation, encapsulation and decapsulation algorithms.
Reza Hooshmand, Mahdi Khoshfekr
doaj   +3 more sources

Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model [PDF]

open access: goldIEEE Access, 2021
Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms.
Shengfeng Xu, Xiangxue Li
doaj   +3 more sources

Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature [PDF]

open access: hybridIET Information Security, 2021
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue   +3 more
doaj   +3 more sources

Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements [PDF]

open access: goldSci
Key exchange mechanisms are foundational to secure communication, yet traditional methods face challenges from quantum computing. The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a post-quantum cryptographic key exchange protocol with ...
Naya Nagy   +7 more
doaj   +3 more sources

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism [PDF]

open access: greenIEEE Transactions on Information Forensics and Security, 2022
The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum Cryptography (PQC) standardization project intending to evaluate and subsequently standardize the suitable PQC
Mohammad Reza Nosouhi   +6 more
openalex   +3 more sources

Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials [PDF]

open access: goldIEEE Access, 2020
In the field of post-quantum cryptography, lattice-based cryptography has received the most noticeable attention. Most lattice-based cryptographic schemes are constructed based on the polynomial ring Rq = Zq[x]/f (x), using a cyclotomic polynomial f (x).
So Hyun Park   +3 more
doaj   +2 more sources

Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms [PDF]

open access: green, 2017
Attribute-Based Encryption (ABE) allows to target the recipients of a message according to a policy expressed as a predicate among some attributes. Ciphertext-policy ABE schemes can choose the policy at the encryption time.In this paper, we define a new property for ABE: homomorphic-policy.
Jérémy Chotard   +2 more
openalex   +6 more sources

Secured Electronic Voting System Using RSA Key Encapsulation Mechanism

open access: diamondEuropean Journal of Electrical Engineering and Computer Science, 2022
A secured process whereas enumerating and casting of votes with the electronic aids with aim of improving the performance of electoral system is called E-voting (Electronic voting). Present e-voting mechanisms are faced with challenges such as confidentiality, integrity, verifiability, transparency, non-repudiation, and authenticity. In e-voting system,
B. O. Ahubele, L. U. Oghenekaro
openalex   +3 more sources

Post-Quantum Wireless-Based Key Encapsulation Mechanism via CRYSTALS-Kyber for Resource-Constrained Devices [PDF]

open access: greenIEEE Access
We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems.
M. A. Gonzalez de la Torre   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy