Key encapsulation

Results: 27



#Item
1Rank-metric Attack on the Edon-K Key Encapsulation Mechanism Matthieu Lequesne1,2 and Jean-Pierre Tillich2 April 5, Sorbonne Université Paris

Rank-metric Attack on the Edon-K Key Encapsulation Mechanism Matthieu Lequesne1,2 and Jean-Pierre Tillich2 April 5, Sorbonne Université Paris

Add to Reading List

Source URL: www.math.fau.edu

Language: English - Date: 2018-04-06 11:47:56
    2Supersingular Isogeny Key Encapsulation Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, David Jao, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir Soukha

    Supersingular Isogeny Key Encapsulation Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, David Jao, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir Soukha

    Add to Reading List

    Source URL: www.craigcostello.com.au

    Language: English - Date: 2018-01-08 19:41:33
      3FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

      FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,

      Add to Reading List

      Source URL: frodokem.org

      - Date: 2017-12-17 17:28:41
        4CS 161  Computer Security Spring 2010

        CS 161 Computer Security Spring 2010

        Add to Reading List

        Source URL: www-inst.eecs.berkeley.edu

        Language: English - Date: 2010-04-03 00:22:05
        5SOA Security  What is challenging? Construction

        SOA Security What is challenging? Construction

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2015-04-09 10:28:09
        6Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

        Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-04-19 14:57:29
        7Limitations of Data Encapsulation and Abstract Data Types Paul L. Bergstein University of Massachusetts Dartmouth  Abstract One of the key benefits provided by object-oriented

        Limitations of Data Encapsulation and Abstract Data Types Paul L. Bergstein University of Massachusetts Dartmouth Abstract One of the key benefits provided by object-oriented

        Add to Reading List

        Source URL: www.cis.umassd.edu

        Language: English - Date: 2000-08-29 17:06:26
        8Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

        Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2010-08-30 11:15:58
        9Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

        Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

        Add to Reading List

        Source URL: www.bmoeller.de

        Language: English - Date: 2006-01-02 00:25:23
        10Authenticated Key Exchange and Key Encapsulation Without Random Oracles Tatsuaki Okamoto NTT, Midori-cho, Musashino-shi, Tokyo, Japan December 26, 2007

        Authenticated Key Exchange and Key Encapsulation Without Random Oracles Tatsuaki Okamoto NTT, Midori-cho, Musashino-shi, Tokyo, Japan December 26, 2007

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2007-12-26 03:18:35