Results 21 to 30 of about 124 (115)

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno   +5 more
doaj   +1 more source

Quantum Election Protocol Based on Quantum Public Key Cryptosystem

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
There is no quantum election protocol that can fulfil the eight requirements of an electronic election protocol, i.e., completeness, robustness, privacy, legality, unreusability, fairness, verifiability, and receipt‐freeness. To address this issue, we employ the general construction of quantum digital signature and quantum public key encryption, in ...
Wenhua Gao, Li Yang, Prosanta Gope
wiley   +1 more source

Post-quantum algorithm of Classic McEliece key encapsulation

open access: yesRadiotekhnika, 2020
A comprehensive analysis of a candidate-finalist of the International Post-quantum Cryptography Competition NIST PQC, namely, the Classic McEliece algorithm, the key encapsulation algorithm based on code cryptosystems, is carried out. The aim of this work is a primary study of the basic characteristics of the Classic McEliece algorithm, such as the ...
openaire   +4 more sources

A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme

open access: yesComplexity, Volume 2020, Issue 1, 2020., 2020
Secret sharing has been study for many years and has had a number of real‐word applications. There are several methods to construct the secret‐sharing schemes. One of them is based on coding theory. In this work, we construct a secret‐sharing scheme that realizes an access structure by using linear codes, in which any element of the access structure ...
Ping Li   +6 more
wiley   +1 more source

Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The McEliece cryptosystem is a strong contender for post-quantum schemes, including key encapsulation for confidentiality of key exchanges in network protocols.
Marcus Brinkmann   +4 more
doaj   +1 more source

Secure and Compact: A New Variant of McEliece Cryptosystem

open access: yesIEEE Access
This paper introduces a variant of the McEliece cryptosystem and employs the $(C_{1}, C_{1} + C_{2})$ -construction to generate a new code from two arbitrary linear codes. We propose an efficient hard-decision decoding algorithm for linear codes derived
Ekta Bindal, Abhay Kumar Singh
doaj   +1 more source

HLS-Based HW/SW Co-Design of the Post-Quantum Classic McEliece Cryptosystem

open access: yes2021 31st International Conference on Field-Programmable Logic and Applications (FPL), 2021
This research was supported by the European Union Regional Development Fund within the framework of the ERDF Operational Program of Catalonia 2014-2020 with a grant of 50% of the total cost eligible, under the DRAC project [001- P-001723]. It was also supported by the Spanish goverment (grant RTI2018-095094-B-C21 “CONSENT”), by the Spanish Ministry of ...
Kostalampros, Ioannis-Vatistas   +4 more
openaire   +2 more sources

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta   +4 more
wiley   +1 more source

polarRLCE: A New Code‐Based Cryptosystem Using Polar Codes

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
Security challenges brought about by the upcoming 5G era should be taken seriously. Code‐based cryptography leverages difficult problems in coding theory and is one of the main techniques enabling cryptographic primitives in the postquantum scenario. In this work, we propose the first efficient secure scheme based on polar codes (i.e., polarRLCE) which
Jingang Liu   +4 more
wiley   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Home - About - Disclaimer - Privacy