{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:18:07Z","timestamp":1771341487082,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1109\/itw48936.2021.9611471","type":"proceedings-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T21:46:27Z","timestamp":1637703987000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid Encryption in Correlated Randomness Model"],"prefix":"10.1109","author":[{"given":"Reihaneh","family":"Safavi-Naini","sequence":"first","affiliation":[]},{"given":"Setareh","family":"Sharifian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"461","article-title":"Ntru prime","volume":"2016","author":"bernstein","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref12","first-page":"4","article-title":"Hamming quasi-cyclic (hqc)","volume":"2","author":"melchor","year":"2018","journal-title":"NIST PQC Round"},{"key":"ref13","first-page":"420","article-title":"Efficient multiparty protocols using circuit randomization","author":"beaver","year":"1991","journal-title":"Annual International Cryptology Conference"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_34"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_29"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"ref3","first-page":"381","article-title":"The notion of security for probabilistic cryptosystems","author":"micali","year":"1986","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403773"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055718"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8709"},{"key":"ref7","article-title":"The Transport Layer Security (TLS) Protocol Version 1.3","author":"rescorla","year":"2020","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-tls-rfc8446bis-00"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref20","article-title":"A proposal for an iso standard for public key encryption (version 2.1)","volume":"112","author":"shoup","year":"2001","journal-title":"IACR e-print archive"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517958"},{"key":"ref21","article-title":"Kem\/dem: Necessary and sufficient conditions for secure hybrid encryption","author":"herranz","year":"2006","journal-title":"manuscript in preparation"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/0217014"},{"key":"ref23","article-title":"A capacity-achieving one-way key agreement with improved finite blocklength analysis, (in proceedings of isita 2020)","author":"sharifian","year":"2020","journal-title":"2020 International Symposium on Information Theory and Its Applications (ISITA)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"}],"event":{"name":"2021 IEEE Information Theory Workshop (ITW)","location":"Kanazawa, Japan","start":{"date-parts":[[2021,10,17]]},"end":{"date-parts":[[2021,10,21]]}},"container-title":["2021 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9611366\/9611357\/09611471.pdf?arnumber=9611471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:52:12Z","timestamp":1652201532000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9611471\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/itw48936.2021.9611471","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]}}}