Formally Verifying Kyber - Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt.
José Bacelar AlmeidaSantiago Arranz OlmosManuel BarbosaGilles BartheFrançois DupressoirBenjamin GrégoireVincent LaporteJean-Christophe LéchenetCameron LowTiago OliveiraHugo PachecoMiguel QuaresmaPeter SchwabePierre-Yves StrubPublished in: CRYPTO (2) (2024)
Keyphrases
- maximum likelihood
- access control
- statistical databases
- canonical correlation analysis
- information security
- security issues
- security requirements
- computer security
- security threats
- security policies
- security problems
- security systems
- batch processing
- security properties
- security vulnerabilities
- episode mining
- human operators
- security analysis
- key management
- functional requirements
- np hard
- network management
- network security
- intrusion detection
- semi supervised