Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [PDF]
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method.
Kübra Seyhan, Sedat Akleylek
doaj +4 more sources
Key encapsulation mechanism based on polar codes
This paper introduces a key encapsulation mechanism based on polar codes, called as KEM‐PC, with secure and efficient key generation, encapsulation and decapsulation algorithms.
Reza Hooshmand, Mahdi Khoshfekr
doaj +3 more sources
Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model [PDF]
Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms.
Shengfeng Xu, Xiangxue Li
doaj +3 more sources
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature [PDF]
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue +3 more
doaj +3 more sources
Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements [PDF]
Key exchange mechanisms are foundational to secure communication, yet traditional methods face challenges from quantum computing. The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a post-quantum cryptographic key exchange protocol with ...
Naya Nagy +7 more
doaj +3 more sources
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism [PDF]
The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum Cryptography (PQC) standardization project intending to evaluate and subsequently standardize the suitable PQC
Mohammad Reza Nosouhi +6 more
openalex +3 more sources
Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials [PDF]
In the field of post-quantum cryptography, lattice-based cryptography has received the most noticeable attention. Most lattice-based cryptographic schemes are constructed based on the polynomial ring Rq = Zq[x]/f (x), using a cyclotomic polynomial f (x).
So Hyun Park +3 more
doaj +2 more sources
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms [PDF]
Attribute-Based Encryption (ABE) allows to target the recipients of a message according to a policy expressed as a predicate among some attributes. Ciphertext-policy ABE schemes can choose the policy at the encryption time.In this paper, we define a new property for ABE: homomorphic-policy.
Jérémy Chotard +2 more
openalex +6 more sources
Secured Electronic Voting System Using RSA Key Encapsulation Mechanism
A secured process whereas enumerating and casting of votes with the electronic aids with aim of improving the performance of electoral system is called E-voting (Electronic voting). Present e-voting mechanisms are faced with challenges such as confidentiality, integrity, verifiability, transparency, non-repudiation, and authenticity. In e-voting system,
B. O. Ahubele, L. U. Oghenekaro
openalex +3 more sources
Post-Quantum Wireless-Based Key Encapsulation Mechanism via CRYSTALS-Kyber for Resource-Constrained Devices [PDF]
We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems.
M. A. Gonzalez de la Torre +3 more
doaj +3 more sources

