Quantum Authentication Evolution: Novel Approaches for Securing Quantum Key Distribution [PDF]
This study introduces a novel approach to bolstering quantum key distribution (QKD) security by implementing swift classical channel authentication within the SARG04 and BB84 protocols.
Hassan Termos
doaj +2 more sources
Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium
Shuffling is an essential countermeasure employed during the implementation of cryptographic algorithms to mitigate vulnerabilities against side-channel attacks, regardless of the algorithm’s nature.
Jonghyeok Lee +7 more
doaj +2 more sources
Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution [PDF]
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei +3 more
doaj +4 more sources
Hardware acceleration for high-volume operations of CRYSTALS-Kyber and CRYSTALS-Dilithium [PDF]
Many high-demand digital services need to perform several cryptographic operations, such as key exchange or security credentialing, in a concise amount of time.
Carril Gil, Xavier +7 more
core +4 more sources
DiLizium: A Two-Party Lattice-Based Signature Scheme [PDF]
In this paper, we propose DiLizium: a new lattice-based two-party signature scheme. Our scheme is constructed from a variant of the Crystals-Dilithium post-quantum signature scheme.
Jelizaveta Vakarjuk +2 more
doaj +2 more sources
Correction Fault Attacks on Randomized CRYSTALS-Dilithium
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices.
Elisabeth Krahmer +3 more
doaj +2 more sources
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks [PDF]
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full key recovery attack. The methodology is composed of two steps.
Olivier Bronchain +4 more
doaj +3 more sources
Acceleration of modular arithmetic in post-quantum signature schemes [PDF]
Since the discovery of the Shor quantum algorithm, capable of solving factorization and discrete logarithm problems in polynomial time, post-quantum cryptographic algorithms have been actively developed.
Igor Y. Zhukov +3 more
doaj +3 more sources
Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversaries.
Jackson, Kelsey A. +2 more
core +2 more sources
Unfolding Post-Quantum Cryptosystems: CRYSTALS-Dilithium, McEliece, BIKE, and HQC
The advent of quantum computers poses a significant threat to the security of classical cryptographic systems. To address this concern, researchers have been actively investigating the development of post-quantum cryptography, which aims to provide ...
Vaghawan Prasad Ojha +3 more
doaj +2 more sources

