Results 21 to 30 of about 1,481 (187)

Crystals-Dilithium on ARMv8 [PDF]

open access: yesSecurity and Communication Networks, 2022
Crystals-Dilithium is one of the digital-signature algorithms in NIST’s ongoing post-quantum cryptography (PQC) standardization final round. Security and computational efficiency concerning software and hardware implementations are the primary criteria for PQC standardization.
Youngbeom Kim   +3 more
openaire   +1 more source

Ataque de puerta trasera cleptográfica contra CRYSTALS-Dilithium [PDF]

open access: yes
[ES] La computación cuántica representa una amenaza para la seguridad de muchos de los algoritmos criptográficos usados en la actualidad. Esto ha impulsado el desarrollo de la conocida como criptografía post-cuántica, que permite, usando nuestros ...
Caballero Gil, Pino   +2 more
core   +2 more sources

Inversion of the X-ray restrained wavefunction equations: a first step towards the development of exchange-correlation functionals based on X-ray data. [PDF]

open access: yesJ Appl Crystallogr
The X‐ray restrained wavefunction (XRW) approach could be a useful tool to propose new exchange–correlation (xc) functionals for density functional theory. Here, orbital‐averaged XRW perturbation potentials of atoms (neon, argon and krypton) and simple molecules (dilithium and urea) are extracted and visualized for the first time, and their possible ...
Genoni A, Sironi M.
europepmc   +2 more sources

Optimizing Crystals-Dilithium implementation in 16-bit MSP430 environment utilizing hardware multiplier

open access: yesICT Express
Dilithium was selected as one of NIST standard Post Quantum Digital Signature algorithms and is undergoing standardization as a Module Lattice Digital Signature Algorithm (ML-DSA).
DongHyun Shin   +2 more
doaj   +2 more sources

Parallel implementation of CRYSTALS-Dilithium for effective signing and verification in autonomous driving environment

open access: yesICT Express, 2023
In the autonomous driving environment, each vehicle performs numerous signing and verification while sending and receiving BSMs (Basic Security Messages) in real-time.
Seog Chung Seo, SangWoo An
doaj   +1 more source

Protecting Dilithium against Leakage

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
CRYSTALS-Dilithium has been selected by the NIST as the new standard for post-quantum digital signatures. In this work, we revisit the side-channel countermeasures of Dilithium in three directions.
Melissa Azouaoui   +9 more
doaj   +1 more source

Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling

open access: yesIEEE Access, 2021
In this paper, we propose single-trace side-channel attacks against $\mathsf {CRYSTALS{-}DILITHIUM}$ . $\mathsf {CRYSTALS{-}DILITHIUM}$ is a lattice-based digital signature algorithm, one of the third round finalists of the national institute of ...
Jaeseung Han   +7 more
doaj   +1 more source

Improving Bitcoin’s Post-Quantum Transaction Efficiency With a Novel Lattice-Based Aggregate Signature Scheme Based on CRYSTALS-Dilithium and a STARK Protocol

open access: yesIEEE Access, 2022
This paper proposes a novel lattice-based aggregate signature (LAS) scheme that brings post-quantum security to the Bitcoin system without sacrificing its transaction efficiency. Bitcoin currently employs Elliptic Curve Digital Signature Algorithm (ECDSA)
Yunjia Quan
doaj   +1 more source

Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments

open access: yesAlgorithms, 2023
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals-
Marin Vidaković, Kruno Miličević
doaj   +1 more source

Quantum attacks on Bitcoin, and how to protect against them [PDF]

open access: yes, 2017
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy