Results 31 to 40 of about 1,481 (187)

A Systematic Study of Lattice-based NIST PQC Algorithms: from Reference Implementations to Hardware Accelerators

open access: yes, 2020
Security of currently deployed public key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, i.e., algorithms that are resistant ...
Abideen, Zain Ul   +2 more
core   +1 more source

Hardware Architecture Design for Modular Arithmetic Acceleration in Post-Quantum Lattice-Based Cryptography Algorithms [PDF]

open access: yes, 2023
En esta tesis, se presenta el diseño de un módulo de hardware para su integración dentro de las etapas de un procesador RISC-V, el cual es capaz de calcular operaciones aritméticas modulares para los esquemas de criptógrafa post-cuántica CRYSTALS-Kyber ...
José Juan Hernández-Morales
core  

First end‐to‐end PQC protected DPU‐to‐DPU communications

open access: yesElectronics Letters, 2023
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera   +4 more
doaj   +1 more source

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Quantum Resistant Authentication Methods for Quantum Key Distribution [PDF]

open access: yes, 2022
Màster Oficial de Ciència i Tecnologia Quàntiques / Quantum Science and Technology, Facultat de Física, Universitat de Barcelona. Curs: 2021-2022. Tutors: Marc Manzano, David JosephQuantum Key Distribution (QKD) can distribute keys securely, even in the ...
Alonso Blanco, Paula
core  

A RISC-V Post Quantum Cryptography Instruction Set Extension for Number Theoretic Transform to Speed-Up CRYSTALS Algorithms

open access: yesIEEE Access, 2021
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
Pietro Nannipieri   +5 more
doaj   +1 more source

Quantum-resistant Transport Layer Security [PDF]

open access: yes
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain   +6 more
core   +3 more sources

Analysis of pseudorandom number generation processes in EP CRYSTALS-Dilithium

open access: yesРадіотехніка, 2023
Наведено аналіз процесів генерації псевдовипадкових чисел в схемі постквантового електронного підпису Crystals-Dilithium, який є фіналістом конкурсу NIST PQC з постквантової криптографії. Основна увага зосереджена на генераторі псевдовипадкових чисел на основі блочного шифру AES в режимі лічильника.
openaire   +3 more sources

CRYPHTOR: A Memory-Unified NTT-Based Hardware Accelerator for Post-Quantum CRYSTALS Algorithms

open access: yesIEEE Access
This paper presents the design and FPGA implementation of a hardware accelerator for the Post-Quantum CRYSTALS-Kyber and CRYSTALS-Dilithium algorithms, named CRYPHTOR (CRYstals Polynomial HW acceleraTOR).
Stefano Di Matteo   +2 more
doaj   +1 more source

TOPCOAT: towards practical two-party Crystals-Dilithium

open access: yesDiscover Computing
Abstract The development of threshold protocols based on lattice-signature schemes has been of increasing interest in the past several years. The main research focus has been towards protocols constructed for various variants of Crystals-Dilithium, future NIST digital signature standard known as ML-DSA.
Nikita Snetkov   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy