Browse > Article

Key Encapsulation Mechanism  

박제홍 (국가보안기술연구소 기반기술연구부)
권대성 (국가보안기술연구소 기반기술연구부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A.W. Dent, 'A designer's guide to KEMs', Cryptography and Coding, Lecture Notes in Comput. Sci. 2898, pp. 133-151. 2003   DOI
2 S. Luck, 'A variant of the Cramer-Shoup cryptosystem for groups of unknown order'. Advances in Cryptology ASIACRYPT 2002. Lecture Notes In Comput. Sci. 2501. pp. 27-45. 2002   DOI   ScienceOn
3 V. Shoup. 'A proposal for an ISO standard for public key encryption (version 2.1)'. Cryptology ePrint Archive, Report 2001/112. 2001
4 V. Shoup. 'Using hash functions as a hedge against chosen ciphertext attack',Advances in Cryptology - EUROCRYPT 2000. Lecture Notes in Comput. Sci. 1807. pp. 275-288. 2000   DOI   ScienceOn
5 Y. Tsiounis. M. Yung, 'On the security of ElGamal based encryption'. Advances in Clyptology - ASIACRYPT 2000, Lecture Notes in Comput. Sci. 1431. pp. 117-132. 1998   DOI   ScienceOn
6 R. Cramer, V. Shoup, 'Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack', SIAM J. Comput., 33(1), pp. 167-226, 2003   DOI   ScienceOn
7 M. Bellare, P. Rogaway, 'Optimal asymmetric encryption padding - How to encrypt with RSA', Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Comput. Sci. 950, pp. 92-111, 1994
8 B. Preneel. A. Biryukov. E. Oswald. B. van Rompay. L. Granboulan. E. Dottax.S. Murphy. A. Dent. J. White, M. Dichtl. S. Pyka, M. Schafheutle, P. Serf. E. Biham, E. Barkan. O. Dunkelman. M. Ciet, F. Sica. L. Knudsen. H. Raddum,'NESSIE security report (NESSIE Deliverable D20. version 2.0)', 2003
9 Information-technology Promotion Agency, Telecommunications Advancement Organization of Japan, 'CRYPTREC Report 2002', 2003
10 R. Gennaro, V. Shoup, 'A note on an encryption scheme of Kurosawa and Desmedt', Cryptology ePrint Archive, Report 2004/196, 2004
11 International Organization for Standardization, 'ISO/IEC CD 18033-2, IT Security techniques - Encryption algorithms - Part 2: AsymmetIic ciphei', 2004
12 T. ElGamal. 'A public key cryptosystem and a signature scheme based on discrete logarithms', IEEE Trans. Info. Theory, 31, pp. 469-472, 1985   DOI
13 M. Bellare, A Desai. D. Pointcheval. P. Rogaway, 'Relations among notions of security for public-key encryption schemes', Advances in Cryptology CRYPTO' 98, Lecture Notes in Comput. Sci. 1462, pp. 26-46, 1998   DOI   ScienceOn
14 K. Kurosawa, Y. Desmedt, Advances in Cryptology - CRYPTO 2004, Lecture Notes in Comput. Sci. 3152, pp. 426-442, 2004   DOI