×

Found 5 Documents (Results 1–5)

Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting. (English) Zbl 1444.94115

Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 141-160 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact hierarchical IBE from lattices in the standard model. (English) Zbl 1452.94095

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 210-221 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards tightly secure deterministic public key encryption. (English) Zbl 1452.94096

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 154-161 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lossy key encapsulation mechanism and its applications. (English) Zbl 1381.94079

Hong, Seokhie (ed.) et al., Information security and cryptology – ICISC 2016. 19th international conference, Seoul, South Korea, November 30 – December 2, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-53176-2/pbk; 978-3-319-53177-9/ebook). Lecture Notes in Computer Science 10157, 126-144 (2017).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Year of Publication

Main Field

Software