A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers

Chik-How Tan, Xun Yi, Chee Kheong Siew. A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. In Reihaneh Safavi-Naini, Jennifer Seberry, editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Volume 2727 of Lecture Notes in Computer Science, pages 428-442, Springer, 2003. [doi]

Abstract

Abstract is missing.