Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt.
José Bacelar AlmeidaSantiago Arranz OlmosManuel BarbosaGilles BartheFrançois DupressoirBenjamin GrégoireVincent LaporteJean-Christophe LéchenetCameron LowTiago OliveiraHugo PachecoMiguel QuaresmaPeter SchwabePierre-Yves StrubPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- maximum likelihood
- canonical correlation analysis
- intrusion detection
- access control
- security requirements
- information security
- network security
- security issues
- security threats
- batch processing
- security policies
- information assurance
- data security
- computer security
- model checking
- data mining
- database
- flowshop
- security model
- security systems
- scheduling problem