Articles with "key encapsulation" as a keyword



Photo by thinkmagically from unsplash

Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3051047

Abstract: Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms. Until now, many Chosen-Ciphertext (IND-CCA) secure KEM schemes are constructed from… read more here.

Keywords: secure; encapsulation mechanism; standard model; key encapsulation ... See more keywords
Photo from wikipedia

Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3280056

Abstract: Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key… read more here.

Keywords: certificate; multi receiver; anonymous multi; key encapsulation ... See more keywords
Photo by robertbye from unsplash

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3264153

Abstract: The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum Cryptography (PQC)… read more here.

Keywords: post quantum; bike; key encapsulation; quantum ... See more keywords
Photo by hudsoncrafted from unsplash

High Throughput Implementation of Post-Quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2021.3103956

Abstract: Internet of Things (IoT) sensor nodes are placed ubiquitously to collect information, which is then vulnerable to malicious attacks. For instance, adversaries can perform side channel attack on the sensor nodes to recover the symmetric… read more here.

Keywords: post quantum; key encapsulation; implementation;
Photo by jayson_hinrichsen from unsplash

Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism

Sign Up to like & get
recommendations!
Published in 2020 at "Applied Sciences"

DOI: 10.3390/app11010193

Abstract: This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round… read more here.

Keywords: sike; key encapsulation; boot attacks; recovery algorithm ... See more keywords