|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 12 occurrences of 12 keywords
|
|
|
Results
Found 34 publication records. Showing 34 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
180 | Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka |
Security on Hybrid Encryption with the Tag-KEM/DEM Framework. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
169 | Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou 0001 |
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
163 | Alexander W. Dent |
A Designer's Guide to KEMs. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
113 | Alexander W. Dent |
Hybrid Signcryption Schemes with Outsider Security. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
94 | Masayuki Abe, Yang Cui 0001, Hideki Imai, Kaoru Kurosawa |
Tag-KEM from Set Partial Domain One-Way Permutations. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien |
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Manuel Barbosa, Pooya Farshim |
Secure Cryptographic Workflow in the Standard Model. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption |
59 | Bogdan Groza |
An Extension of the RSA Trapdoor in a KEM/DEM Framework. |
SYNASC |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup |
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Laila El Aimani |
Anonymity from Public Key Encryption to Undeniable Signatures. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction |
33 | Yusuke Sakai 0001, Takahiro Matsuda 0002, Goichiro Hanaoka |
Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening. |
IEICE Trans. Inf. Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
33 | Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi 0001 |
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation. |
J. Inf. Secur. Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
33 | Yusuke Sakai 0001, Takahiro Matsuda 0002, Goichiro Hanaoka |
Tag-KEM/DEM framework for public-key encryption with non-interactive opening. |
ISITA |
2016 |
DBLP BibTeX RDF |
|
33 | Yuan Chen 0008, Qingkuan Dong |
Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon 0002 |
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
33 | Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi 0001 |
A KEM/DEM-Based Construction for Secure and Anonymous Communication. |
COMPSAC Workshops |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon 0002 |
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. |
WISA |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Yuan Chen 0008, Xiaofeng Chen 0001, Hui Li 0006 |
More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure. |
Int. J. Grid Util. Comput. |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga |
Randomness Leakage in the KEM/DEM Framework. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Yuan Chen 0008, Qingkuan Dong |
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions. |
Secur. Commun. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Yuan Chen 0008, Qingkuan Dong |
RCCA Security for KEM+DEM Style Hybrid Encryptions. |
Inscrypt |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga |
Randomness Leakage in the KEM/DEM Framework. |
ProvSec |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
33 | Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto |
A Universally Composable Secure Channel Based on the KEM-DEM Framework. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto |
A Universally Composable Secure Channel Based on the KEM-DEM Framework. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Alexander W. Dent, Qiang Tang 0001 |
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay |
TCHo: A Hardware-Oriented Trapdoor Cipher. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
hardware, linear feedback shift register, public-key cryptosystem, polynomial multiples, post-quantum cryptography |
26 | James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt |
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Rui Zhang 0002, Hideki Imai |
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Dennis Hofheinz, Eike Kiltz |
Secure Hybrid Encryption from Weakened Key Encapsulation. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Tor E. Bjørstad, Alexander W. Dent |
Building Better Signcryption Schemes with Tag-KEMs. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Benoît Libert, Jean-Jacques Quisquater |
Identity Based Encryption Without Redundancy. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
ID-based encryption, redundancies, provable security |
26 | John Malone-Lee |
A General Construction for Simultaneous Signing and Encrypting. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #34 of 34 (100 per page; Change: )
|
|