• KEM-DEM

  • Referenced in 59 articles [sw03093]
  • adaptively chosen ciphertext attacks (IND-CCA2) and DEM semantically secure against adaptively chosen plaintext/ciphertext attacks ... sufficient to realize a universally composable (UC) secure channel. To obtain the main result, this ... shows several equivalence results: UC KEM, IND-CCA2 KEM and NM-CCA2 (non-malleable against...
  • McEliece

  • Referenced in 251 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • McBits

  • Referenced in 9 articles [sw14754]
  • McBits: Fast Constant-Time Code-Based Cryptography. This...