Key encapsulation

Results: 27



#Item
11Identity-Based Key-Encapsulation Mechanism from Multilinear Maps Hao Wang1,2,3? , Lei Wu1,2 , Zhihua Zheng1,2 , and Yilei Wang4 1  School of Information Science and Engineering, Shandong Normal University

Identity-Based Key-Encapsulation Mechanism from Multilinear Maps Hao Wang1,2,3? , Lei Wu1,2 , Zhihua Zheng1,2 , and Yilei Wang4 1 School of Information Science and Engineering, Shandong Normal University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-16 21:15:45
12Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1  2

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
13Foundations of Computer Security - Lecture 44: Symmetric vs. Asymmetric Encryption

Foundations of Computer Security - Lecture 44: Symmetric vs. Asymmetric Encryption

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-07-02 17:10:35
14KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-08 09:12:18
15Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms ? Shengli Liu1 and Kenneth G. Paterson2 1  2

Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms ? Shengli Liu1 and Kenneth G. Paterson2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 02:49:11
16How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-17 11:11:00
17Decryptable Searchable Encryption Thomas Fuhr1 and Pascal Paillier2 1 Direction Centrale de la S´ecurit´e des Syst`emes d’Information [removed]

Decryptable Searchable Encryption Thomas Fuhr1 and Pascal Paillier2 1 Direction Centrale de la S´ecurit´e des Syst`emes d’Information [removed]

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:20
18Report on Present State of PSEC-KEM Cryptosystem Evaluation (screening evaluation) January 28, 2002 Natsume Matsuzaki, Member

Report on Present State of PSEC-KEM Cryptosystem Evaluation (screening evaluation) January 28, 2002 Natsume Matsuzaki, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
19Proving the TLS Handshake Secure (as it is) Karthikeyan Bhargavan Alfredo Pironti §

Proving the TLS Handshake Secure (as it is) Karthikeyan Bhargavan Alfredo Pironti §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-15 07:32:58
20Lattice Cryptography for the Internet Chris Peikert∗ February 17, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such

Lattice Cryptography for the Internet Chris Peikert∗ February 17, 2014 Abstract In recent years, lattice-based cryptography has been recognized for its many attractive properties, such

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-18 17:10:47