Results 31 to 40 of about 1,481 (187)
Security of currently deployed public key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, i.e., algorithms that are resistant ...
Abideen, Zain Ul +2 more
core +1 more source
Hardware Architecture Design for Modular Arithmetic Acceleration in Post-Quantum Lattice-Based Cryptography Algorithms [PDF]
En esta tesis, se presenta el diseño de un módulo de hardware para su integración dentro de las etapas de un procesador RISC-V, el cual es capaz de calcular operaciones aritméticas modulares para los esquemas de criptógrafa post-cuántica CRYSTALS-Kyber ...
José Juan Hernández-Morales
core
First end‐to‐end PQC protected DPU‐to‐DPU communications
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera +4 more
doaj +1 more source
A Mathematical Perspective on Post-Quantum Cryptography
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter +3 more
doaj +1 more source
Quantum Resistant Authentication Methods for Quantum Key Distribution [PDF]
Màster Oficial de Ciència i Tecnologia Quàntiques / Quantum Science and Technology, Facultat de Física, Universitat de Barcelona. Curs: 2021-2022. Tutors: Marc Manzano, David JosephQuantum Key Distribution (QKD) can distribute keys securely, even in the ...
Alonso Blanco, Paula
core
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
Pietro Nannipieri +5 more
doaj +1 more source
Quantum-resistant Transport Layer Security [PDF]
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain +6 more
core +3 more sources
Analysis of pseudorandom number generation processes in EP CRYSTALS-Dilithium
Наведено аналіз процесів генерації псевдовипадкових чисел в схемі постквантового електронного підпису Crystals-Dilithium, який є фіналістом конкурсу NIST PQC з постквантової криптографії. Основна увага зосереджена на генераторі псевдовипадкових чисел на основі блочного шифру AES в режимі лічильника.
openaire +3 more sources
CRYPHTOR: A Memory-Unified NTT-Based Hardware Accelerator for Post-Quantum CRYSTALS Algorithms
This paper presents the design and FPGA implementation of a hardware accelerator for the Post-Quantum CRYSTALS-Kyber and CRYSTALS-Dilithium algorithms, named CRYPHTOR (CRYstals Polynomial HW acceleraTOR).
Stefano Di Matteo +2 more
doaj +1 more source
TOPCOAT: towards practical two-party Crystals-Dilithium
Abstract The development of threshold protocols based on lattice-signature schemes has been of increasing interest in the past several years. The main research focus has been towards protocols constructed for various variants of Crystals-Dilithium, future NIST digital signature standard known as ML-DSA.
Nikita Snetkov +2 more
openaire +1 more source

