搜索结果: 1-15 共查到“军队指挥学 KEM”相关记录21条 . 查询时间(0.093 秒)
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Lattice based cryptography side-channel attacks CCA transformation
2019/8/21
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Towards KEM Unification
PKE OW-CPA OW-Passive
2018/6/5
This paper highlights a particular construction of a correct KEM without failures and without ciphertext expansion from any correct deterministic PKE, and presents a simple tight proof of ROM IND-CCA2...
QC-MDPC: A Timing Attack and a CCA2 KEM
post-quantum cryptography code-based cryptography QC-MDPC codes
2018/3/12
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This proposal uses an iterative bi...
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
CPA-secure encryption CCA-secure KEM
2018/3/5
In this paper, we introduce Saber, a package of cryptographic primitives whose security relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first describe a secure Diffie...
Key-encapsulation mechanisms (KEMs) are a common stepping stone for constructing public-key encryption. Secure KEMs can be built from diverse assumptions, including ones related to integer factorizati...
Round2: KEM and PKE based on GLWR
key encapsulation public key encryption lattice techniques
2017/12/11
Cryptographic primitives that are secure against quantum computing are receiving growing attention with recent, steady advances in quantum computing and standardization initiatives in post-quantum cry...
Post-quantum IND-CCA-secure KEM without Additional Hash
quantum random oracle model key encapsulation mechanism IND-CCA security
2017/11/13
With the gradual progress of NIST's post-quantum cryptography standardization, several practical post-quantum secure key encapsulation mechanism (KEM) schemes have been proposed. Generally, an IND-CCA...
CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
KEM lattice techniques implementation
2017/6/28
This paper introduces Kyber (part of the CRYSTALS -- Cryptographic Suite for Algebraic Lattices -- package that will be submitted to the NIST call for post-quantum standards), a portfolio of post-quan...
In this paper, we propose an efficient identity-based password
authenticated key exchange (IBPAKE) protocol using identitybased
KEM/DEM. In IBPAKE, a client conducts authentication based
on a human...
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
public-key cryptography identity-based extractable hash proof
2013/2/21
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO ’10)...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA securiy CBDH assumption
2012/6/14
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA security CBDH assumption
2012/3/22
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
identity based encryption standard model CCA security CBDH assumption
2012/3/21
In this paper, we propose several selective-identity chosen-ciphertext attack secure iden- tity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffi...
Efficient Certificateless KEM in the Standard Model
Efficient Certificateless KEM Standard Model
2009/9/27
We give a direct construction of a certificateless key encap-
sulation mechanism (KEM) in the standard model that is more ecient
than the generic constructions proposed before by Huang and Wong [9]...
Efficient Certificateless KEM in the Standard Model
Efficient Certificateless KEM Standard Model
2009/9/22
We give a direct construction of a certificateless key encap-
sulation mechanism (KEM) in the standard model that is more efficient
than the generic constructions proposed before by Huang and Wong [...