Chik-How Tan, Xun Yi, Chee Kheong Siew. A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. In Reihaneh Safavi-Naini, Jennifer Seberry, editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Volume 2727 of Lecture Notes in Computer Science, pages 428-442, Springer, 2003. [doi]
@inproceedings{TanYS03, title = {A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers}, author = {Chik-How Tan and Xun Yi and Chee Kheong Siew}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2727&spage=428}, tags = {rule-based}, researchr = {https://researchr.org/publication/TanYS03}, cites = {0}, citedby = {0}, pages = {428-442}, booktitle = {Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, editor = {Reihaneh Safavi-Naini and Jennifer Seberry}, volume = {2727}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-40515-1}, }