-
KEM-DEM
- Referenced in 59 articles
[sw03093]
- adaptively chosen ciphertext attacks (IND-CCA2) and DEM semantically secure against adaptively chosen plaintext/ciphertext attacks ... sufficient to realize a universally composable (UC) secure channel. To obtain the main result, this ... shows several equivalence results: UC KEM, IND-CCA2 KEM and NM-CCA2 (non-malleable against...
-
McEliece
- Referenced in 251 articles
[sw02076]
- Practical power analysis attacks on software implementations of...
-
McBits
- Referenced in 9 articles
[sw14754]
- McBits: Fast Constant-Time Code-Based Cryptography. This...