Results 11 to 20 of about 1,481 (187)

Quantum Authentication Evolution: Novel Approaches for Securing Quantum Key Distribution [PDF]

open access: yesEntropy
This study introduces a novel approach to bolstering quantum key distribution (QKD) security by implementing swift classical channel authentication within the SARG04 and BB84 protocols.
Hassan Termos
doaj   +2 more sources

Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium

open access: yesIEEE Access, 2023
Shuffling is an essential countermeasure employed during the implementation of cryptographic algorithms to mitigate vulnerabilities against side-channel attacks, regardless of the algorithm’s nature.
Jonghyeok Lee   +7 more
doaj   +2 more sources

Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution [PDF]

open access: yesComputers
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei   +3 more
doaj   +4 more sources

Hardware acceleration for high-volume operations of CRYSTALS-Kyber and CRYSTALS-Dilithium [PDF]

open access: yesACM Transactions on Reconfigurable Technology and Systems
Many high-demand digital services need to perform several cryptographic operations, such as key exchange or security credentialing, in a concise amount of time.
Carril Gil, Xavier   +7 more
core   +4 more sources

DiLizium: A Two-Party Lattice-Based Signature Scheme [PDF]

open access: yesEntropy, 2021
In this paper, we propose DiLizium: a new lattice-based two-party signature scheme. Our scheme is constructed from a variant of the Crystals-Dilithium post-quantum signature scheme.
Jelizaveta Vakarjuk   +2 more
doaj   +2 more sources

Correction Fault Attacks on Randomized CRYSTALS-Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices.
Elisabeth Krahmer   +3 more
doaj   +2 more sources

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks [PDF]

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full key recovery attack. The methodology is composed of two steps.
Olivier Bronchain   +4 more
doaj   +3 more sources

Acceleration of modular arithmetic in post-quantum signature schemes [PDF]

open access: yesБезопасность информационных технологий
Since the discovery of the Shor quantum algorithm, capable of solving factorization and discrete logarithm problems in polynomial time, post-quantum cryptographic algorithms have been actively developed.
Igor Y. Zhukov   +3 more
doaj   +3 more sources

Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model

open access: yes, 2023
In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing cryptographic protocols that are resistant to attacks by quantum adversaries.
Jackson, Kelsey A.   +2 more
core   +2 more sources

Unfolding Post-Quantum Cryptosystems: CRYSTALS-Dilithium, McEliece, BIKE, and HQC

open access: yesMathematics
The advent of quantum computers poses a significant threat to the security of classical cryptographic systems. To address this concern, researchers have been actively investigating the development of post-quantum cryptography, which aims to provide ...
Vaghawan Prasad Ojha   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy