2018
DOI: 10.1007/978-3-319-76578-5_7
|View full text |Cite
|
Sign up to set email alerts
|

KEM Combiners

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(33 citation statements)
references
References 21 publications
0
33
0
Order By: Relevance
“…This concatenated key is given as input to HKDF to generate shared session keys which can be used by symmetric-key algorithm for encryption and decryption. Only one HKDF operation is required [Giacon F., et al (2018)] [Bindel N., et al (2019)].…”
Section: Concat_then_kdfmentioning
confidence: 99%
“…This concatenated key is given as input to HKDF to generate shared session keys which can be used by symmetric-key algorithm for encryption and decryption. Only one HKDF operation is required [Giacon F., et al (2018)] [Bindel N., et al (2019)].…”
Section: Concat_then_kdfmentioning
confidence: 99%
“…Berndt and Liśkiewicz [29] proved that successful ASAs correspond to secure stegosystems on certain channels and vice versa. Giacon, Heuer, and Poettering [30] proposed key-encapsulation mechanism (KEM) combiners, which can be potentially employed to prevent ASAs. Auerbach, Bellare, and Kiltz [31] studied the security of publickey encryption schemes and KEMs when public parameters they use may be subverted.…”
Section: B Related Workmentioning
confidence: 99%
“…Combiners for other primitives have since followed, including hybrid digital signatures by Bindel et al [12]. Most relevant to our setting of key exchange and KEMs is the work by Giacon et al [26] which considers various KEM combiners. While this work on KEM combiners is an important first step towards constructing hybrid KEMs, their solutions focus solely on classical adversaries.…”
Section: Introductionmentioning
confidence: 99%
“…While this work on KEM combiners is an important first step towards constructing hybrid KEMs, their solutions focus solely on classical adversaries. Since the advent of quantum computing and thus the introduction of more powerful adversaries is an important motivation for investigating hybrid key exchange, quantum security analyses of hybrid schemes is not to be neglected; in particular because most of the constructions of [26] use idealized assumptions such as random oracles that might not immediately transfer to the quantum setting [13]. Moreover, the (quantum) security of hybrid authenticated key exchange remains unresolved in [26].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation