Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Key encapsulation

Known as: Digital envelope 
Key encapsulation mechanisms (KEMs) are a class of encryption techniques designed to secure symmetric cryptographic key material for transmission… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This work presents a new code-based key encapsulation mechanism (KEM) called LEDAkem. It is built on the Niederreiter… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
2018
2018
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2018
2018
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’s post-quantum cryptography… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2017
2017
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they… Expand
  • table 2
  • table 3
  • table 4
  • table 5
  • table 6
Is this relevant?
2017
2017
Key-encapsulation mechanisms secure against chosen ciphertext attacks (IND-CCA-secure KEMs) in the quantum random oracle model… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2017
2017
This paper presents software demonstrating that the 20-year-old NTRU cryptosystem is competitive with more recent lattice-based… Expand
  • table 1
  • table 2
Is this relevant?
2017
2017
Current widely-used key exchange (KE) mechanisms will be vulnerable to quantum attacks when sufficiently strong quantum computers… Expand
  • table 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Many traditional and newer businesses and applications have recently been carrying out enormous amounts of electronic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
At CRYPTO 2004, Kurosawa and Desmedt presented a new hybrid encryption scheme that is chosen-ciphertext (CCA2) secure in the… Expand
Is this relevant?