A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers

Chik-How Tan, Xun Yi, Chee Kheong Siew. A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. In Reihaneh Safavi-Naini, Jennifer Seberry, editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Volume 2727 of Lecture Notes in Computer Science, pages 428-442, Springer, 2003. [doi]

@inproceedings{TanYS03,
  title = {A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers},
  author = {Chik-How Tan and Xun Yi and Chee Kheong Siew},
  year = {2003},
  url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2727&spage=428},
  tags = {rule-based},
  researchr = {https://researchr.org/publication/TanYS03},
  cites = {0},
  citedby = {0},
  pages = {428-442},
  booktitle = {Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  editor = {Reihaneh Safavi-Naini and Jennifer Seberry},
  volume = {2727},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-40515-1},
}