Results 51 to 60 of about 1,481 (187)

Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network

open access: yesApplied Sciences
In the proposed protocol, a trusted entity interacts with the terminal device of each user to verify the legitimacy of the public keys without having access to the private keys that are generated and kept totally secret by the user.
Mahafujul Alam   +2 more
doaj   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Fast and Clean: Auditable high-performance assembly via constraint solving

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Handwritten assembly is a widely used tool in the development of highperformance cryptography: By providing full control over instruction selection, instruction scheduling, and register allocation, highest performance can be unlocked.
Amin Abdulrahman   +3 more
doaj   +1 more source

CRYSTALS – Dilithium: Digital Signatures from Module Lattices [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Contains fulltext : 191703.pdf (Author’s version preprint ) (Open Access) Contains fulltext : 191703-1.pdf (Publisher’s version ) (Open Access)
Ducas, L.   +5 more
openaire   +1 more source

Accelerating Post-Quantum Cryptography Algorithms on the Nvidia Bluefield 3 DPU: An Active Analysis [PDF]

open access: yes
As the development of powerful quantum computers progresses, the threat to public key cryptography posed by the Shor algorithm is becoming increasingly serious.
Meinl, Lukas
core   +1 more source

Acceleration of Post Quantum Digital Signature Scheme CRYSTALS-Dilithium on Reconfigurable Hardware

open access: yes2022 32nd International Conference on Field-Programmable Logic and Applications (FPL), 2022
This research investigates efficient architectures for the implementation of the CRYSTALS-Dilithium post-quantum digital signature scheme on reconfigurable hardware, in terms of speed, memory usage, power consumption and resource utilisation. Post quantum digital signature schemes involve a significant computational effort, making efficient hardware ...
Campbell, Donal   +3 more
openaire   +2 more sources

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
This paper presents a new profiling side-channel attack on CRYSTALSDilithium, the new NIST primary standard for quantum-safe digital signatures. An open source implementation of CRYSTALS-Dilithium is already available, with constant-time property as a ...
Alexandre Berzati   +5 more
doaj   +1 more source

Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM [PDF]

open access: yes, 2022
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalists and ...
Aydin Aysu, Emre Karabulut, Erdem Alkim
core  

A Monolithium Monohydrogen Porphyrin

open access: yesAngewandte Chemie International Edition, Volume 64, Issue 31, July 28, 2025.
A monohydrogen metalloporphyrin was synthesized by reacting lithium vapor with a thin film of tetraphenylporphyrin under UHV conditions. The resulting LiHTPP complex is thermally stable and isolable by vacuum sublimation. Spectroscopic and theoretical analyses reveal insights into its nonplanar structure, energetics, and mechanism of formation and ...
Maik Schöniger   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy