Skip to content

Commit

Permalink
Script updating gh-pages from fe7316e. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Jan 10, 2025
1 parent fcaadc6 commit a9df0db
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion bas/daniel/draft-ietf-lamps-kyber-certificates.html
Original file line number Diff line number Diff line change
Expand Up @@ -1497,7 +1497,7 @@ <h2 id="name-security-considerations">
<p id="section-7-6">Many protocols only rely on the IND-CCA security of a KEM. Some
(implicitly) require further binding properties, formalized
in <span>[<a href="#CDM23" class="cite xref">CDM23</a>]</span>.
The key format influences these binding properties.
The private key format influences these binding properties.
Per <span>[<a href="#KEMMY24" class="cite xref">KEMMY24</a>]</span>, ML-KEM is LEAK-BIND-K-PK-secure and
LEAK-BIND-K-CT-secure when using the expanded private key format,
but not MAL-BIND-K-CT nor MAL-BIND-K-PK.
Expand Down
12 changes: 6 additions & 6 deletions bas/daniel/draft-ietf-lamps-kyber-certificates.txt
Original file line number Diff line number Diff line change
Expand Up @@ -341,12 +341,12 @@ Table of Contents

Many protocols only rely on the IND-CCA security of a KEM. Some
(implicitly) require further binding properties, formalized in
[CDM23]. The key format influences these binding properties. Per
[KEMMY24], ML-KEM is LEAK-BIND-K-PK-secure and LEAK-BIND-K-CT-secure
when using the expanded private key format, but not MAL-BIND-K-CT nor
MAL-BIND-K-PK. Using the 64-byte seed format provides a step up in
binding security, providing MAL-BIND-K-CT, but still not MAL-BIND-
K-PK. For more guidance, see
[CDM23]. The private key format influences these binding properties.
Per [KEMMY24], ML-KEM is LEAK-BIND-K-PK-secure and LEAK-BIND-K-CT-
secure when using the expanded private key format, but not MAL-BIND-
K-CT nor MAL-BIND-K-PK. Using the 64-byte seed format provides a
step up in binding security, providing MAL-BIND-K-CT, but still not
MAL-BIND-K-PK. For more guidance, see
[I-D.sfluhrer-cfrg-ml-kem-security-considerations].

8. IANA Considerations
Expand Down

0 comments on commit a9df0db

Please sign in to comment.