A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers

Chik-How Tan, Xun Yi, Chee Kheong Siew. A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. In Reihaneh Safavi-Naini, Jennifer Seberry, editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Volume 2727 of Lecture Notes in Computer Science, pages 428-442, Springer, 2003. [doi]

Authors

Chik-How Tan

This author has not been identified. Look up 'Chik-How Tan' in Google

Xun Yi

This author has not been identified. Look up 'Xun Yi' in Google

Chee Kheong Siew

This author has not been identified. Look up 'Chee Kheong Siew' in Google