
handle: 11573/1673065
In this paper we revisit some of the main aspects of the DAGS Key Encapsulation Mechanism, one of the code-based candidates to NIST’s standardization call for the key exchange/encryption functionalities. In particular, we modify the algorithms for key generation, encapsulation and decapsulation to fit an alternative KEM framework, and we present a new set of parameters that use binary codes. We discuss advantages and disadvantages for each of the variants proposed.
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], 330, Post-quantum cryptography, Key exchange, Code-based cryptography; Key exchange; Post-quantum cryptography, Code-based cryptography, 004
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], 330, Post-quantum cryptography, Key exchange, Code-based cryptography; Key exchange; Post-quantum cryptography, Code-based cryptography, 004
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 3 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
