搜索结果: 1-15 共查到“军事学 Key-Encapsulation”相关记录35条 . 查询时间(0.062 秒)
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
public-key cryptography leakage-resilient identity-based encryption
2019/8/30
In this paper, we propose a new leakage-resilient identity-based encryption (IBE) scheme that is secure against chosen-ciphertext attacks (CCA) in the bounded memory leakage model. It is the first CCA...
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
SIKE post-quantum cryptography isogeny-based cryptography FPGA
2019/6/19
In this work, we present a fast parallel architecture to perform supersingular isogeny key encapsulation (SIKE). We propose and implement a fast isogeny accelerator architecture that uses fast and par...
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
non-tightness quantum random oracle model Fujisaki-Okamoto
2019/5/21
Key encapsulation mechanism (KEM) variants of the Fujisaki-Okamoto (FO) transformation (CRYPTO 1999 and Journal of Cryptology 2013) that turn a weakly-secure public-key encryption (PKE) into an IND-CC...
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors
ARM assembly finite field isogeny-based cryptosystems
2019/4/3
In this work, we present highly-optimized constant-time software libraries for Supersingular Isogeny Key Encapsulation (SIKE) protocol on ARMv8 processors. Our optimized hand-crafted assembly librarie...
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
LWE RLWE KEM
2019/3/13
In this paper, we present a simple attack on LWE and Ring LWE encryption schemes used directly as Key Encapsulation Mechanisms (KEMs). This attack could work due to the fact that a key mismatch in a K...
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
quantum random oracle model key encapsulation mechanism generic construction
2019/2/27
In (TCC 2017), Hofheinz, Hoevelmanns and Kiltz provided a fine-grained and modular toolkit of generic key encapsulation mechanism (KEM) constructions, which were widely used among KEM submissions to N...
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
quantum random oracle model key encapsulation mechanism explicit rejection
2019/1/26
The recent post-quantum cryptography standardization project launched by NIST increased the interest in generic key encapsulation mechanism (KEM) constructions in the quantum random oracle (QROM). Bas...
In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to NIST's standardization call for the key exchange/encryption functionaliti...
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
Authenticated Key Exchange CK Model Key Encapsulation Mechanism
2018/11/19
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM)....
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tight security quantum chosen-ciphertext security post-quantum cryptography
2018/11/16
This paper shows the security against quantum chosen-ciphertext attacks (QCCA security) of the KEM in Saito, Yamakawa, and Xagawa (EUROCRYPT 2018) in the QROM. The proof is very similar to that for th...
Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model
key exchange key encapsulation mechanism post-quantum cryptography
2018/11/13
A multitude of post-quantum key encapsulation mechanisms (KEMs) and public key encryption (PKE) schemes implicitly rely on a protocol by which Alice and Bob exchange public messages and converge on se...
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
hybrid key exchange key exchange hybrids
2018/11/9
Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transitio...
Standard Lattice-Based Key Encapsulation on Embedded Devices
Post-quantum cryptography standard lattices Frodo
2018/7/18
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al. proposed the key exchange...
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM
Key encapsulation scheme post-quantum cryptography lattice-based cryptography
2018/7/17
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST's post-quantum cryptography standardization process. In this paper, we study the implementation aspe...