A designer's guide to KEMs

AW Dent - IMA International Conference on Cryptography and …, 2003 - Springer
… , simple methods for constructing a KEM where the security of the KEM is based on weak as…
new KEM based on the Rabin function that is both efficient and secure, and is the first KEM to …

[PDF][PDF] A Designer's Guide to KEMs

E List - Citeseer
… , simple methods for constructing a KEM where the security of the KEM is based on weak as…
new KEM based on the Rabin function that is both efficient and secure, and is the first KEM to …

[BOOK][B] Design: Tools of the trade

JD Kem - 2009 - books.google.com
The topic of design is vital to our Army's ability to prevail in the complex, ambiguous
environment of the 21st century. Of the many lessons drawn from over seven years of wartime …

[PDF][PDF] KEM

R Massey - pesticide-albania.com
… Although program designers had assumed that firms would adopt cleaner production
techniques once they were made aware of their financial benefits, this did not turn out to be the …

Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability

M Bellare, H Davis, F Günther - … on the Theory and Applications of …, 2020 - Springer
… We found other KEMs where … KEMs as possible (which we do) but to specify and validate
methods that will be useful beyond that. Below we begin by discussing the NIST PQC KEMs

IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited

H Jiang, Z Zhang, L Chen, H Wang, Z Ma - … , CA, USA, August 19–23, 2018 …, 2018 - Springer
… With the gradual progress of NIST’s post-quantum cryptography standardization, the Round-1
KEM proposals have been posted for public to discuss and evaluate. Among the IND-CCA-…

[BOOK][B] Kem Weber: Designer and Architect

CA Long - 2014 - books.google.com
guide to Kem Weber, helping me to navigate the extensive collection of work at the ucsb
archive. Later, Melinda Gandara, Alexander Hauschild, and Jennifer Whitlock kindly aided me …

Towards KEM unification

DJ Bernstein, E Persichetti - Cryptology ePrint Archive, 2018 - eprint.iacr.org
KEM without failures and without ciphertext expansion from any correct deterministic PKE,
and presents a simple tight proof of ROM IND-CCA2 security for the KEM … The KEM is easy to …

Status of master specification (KEM-SPEC) for electrical installation and construction in korea

YP Wang, J Ahn, SS Seo, GG Kim… - INTELEC 2009-31st …, 2009 - ieeexplore.ieee.org
… Master Specification (the following called KEMSPEC.) was developed by software and
introduce the electrical installation and construction classification system in KEMSPEC.. …

Tag-KEM/DEM: A new framework for hybrid encryption

M Abe, R Gennaro, K Kurosawa - Journal of Cryptology, 2008 - Springer
… Since we use KEM only as a building block to construct Tag-KEM in this paper, we consider
KEM.Enc that outputs K ∈ KK for some specific domain KK rather than the ones adjusted to …