Implementation suggestions Clause Samples
Implementation suggestions. It is imperative to adapt this protocol to a Key Encapsulation Mechanism (KEM) to ensure that its intrinsic security complies with the NIST post-quantum standardization proposals [16]. This requires the addition of a postquantum public-key cryptosystem [1]. Other issues such as constant time or uniform power consumption should be considered to achieve side-channel attack protection [22]. The benefit achieved is the adaptation of semantic security to the IND-CCA level [25, 26, 27]. The following procedure presents the proposed KEM based on the multiRDMPF key-agreement protocol (KAP). Note that it cryp- tographically conceals all otherwise public information except the setup parameters, thereby enhancing security.
