Results 1 to 10 of about 124 (115)

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]

open access: yesSensors, 2023
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq   +6 more
doaj   +2 more sources

Classic McEliece on the ARM Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper presents a constant-time implementation of Classic McEliece for ARM Cortex-M4. Specifically, our target platform is stm32f4-Discovery, a development board on which the amount of SRAM is not even large enough to hold the public key of the ...
Ming-Shing Chen, Tung Chou
doaj   +3 more sources

Complete and Improved FPGA Implementation of Classic McEliece

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We present the first specification-compliant constant-time FPGA implementation of the Classic McEliece cryptosystem from the third-round of NIST’s Post-Quantum Cryptography standardization process.
Po-Jen Chen   +6 more
doaj   +2 more sources

A Key-Recovery Side-Channel Attack on Classic McEliece Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project.
Qian Guo   +2 more
doaj   +4 more sources

Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece

open access: yesApplied Sciences, 2023
Homomorphic encryption is a powerful mechanism that allows sensitive data, such as biometric data, to be compared in a protected way, revealing only the comparison result when the private key is known.
Rosario Arjona   +3 more
doaj   +4 more sources

Efficient ASIC Architecture for Low Latency Classic McEliece Decoding

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Post-quantum cryptography addresses the increasing threat that quantum computing poses to modern communication systems. Among the available “quantum-resistant” systems, the Classic McEliece key encapsulation mechanism (KEM) is positioned as a ...
Daniel Fallnich   +3 more
doaj   +2 more sources

Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi   +4 more
doaj   +3 more sources

On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight

open access: yesIEEE Access, 2023
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a
Luca Mariot   +2 more
doaj   +1 more source

An asymmetric cryptography using Gaussian integers

open access: yesEngineering and Applied Science Research, 2020
In this paper, the already strong McEliece cryptosystem is enhanced with atwo-dimensional finite Gaussian integer. By substituting the one-dimensional linear code with atwo-dimensional code employing afinite Gaussian integer, anew system ...
Wanarat Juraphanthong   +1 more
doaj   +1 more source

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy