3 Matching Annotations
- May 2020
-
tools.ietf.org tools.ietf.org
-
As a result, the algorithm enjoys a "tight" security proof in the random oracle model.
-
- Mar 2020
-
eprint.iacr.org eprint.iacr.org
-
Figure 7: One-phase experiment
I use this security notion for DHKEM
-
We then considerthe same question for key-encapsulation mechanisms (KEMs)and show that in this case the fournotionsareall equivalent.
-