Researchr is a web site for finding, collecting, sharing, and reviewing scientific publications, for researchers by researchers.
Sign up for an account to create a profile with publication list, tag and review your related work, and share bibliographies with your co-authors.
Rongmao Chen, Xinyi Huang, Moti Yung. Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. IACR Cryptology ePrint Archive, 2020:1079, 2020. [doi]
Possibly Related PublicationsThe following publications are possibly variants of this publication: Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key EncryptionRongmao Chen, Xinyi Huang, Moti Yung. asiacrypt 2020: 98-128 [doi] More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structureYuan Chen, Xiaofeng Chen 0001, Hui Li. ijguc, 5(1):60-70, 2014. [doi] RCCA Security for KEM+DEM Style Hybrid EncryptionsYuan Chen, Qingkuan Dong. cisc 2013: 102-121 [doi]
The following publications are possibly variants of this publication: