Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim +2 more
doaj +1 more source
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium [PDF]
The looming threat of an adversary with Quantum computing capability led to a worldwide research effort towards identifying and standardizing novel post-quantum cryptographic primitives.
Anupam Chattopadhyay +3 more
core
Edge-enabled quantum-safe real-time vaccine supply chain optimization: a decentralized framework for autonomous decision making [PDF]
The centralized architectures of global vaccine supply chains pose severe security, latency, and operational efficiency challenges to new threats of quantum computing.
Nirupam Saha +8 more
doaj +2 more sources
Redetermination of the low-temperature polymorph of Li2MnSiO4 from single-crystal X-ray data
Crystals of dilithium manganese(II) silicate were grown under high-temperature hydrothermal conditions in the system LiOH—MnO2—SiO2. The title compound crystallizes in the βII-Li3PO4 structure type. The coordination polyhedra
Mineo Sato +4 more
doaj +1 more source
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium [PDF]
We present a set of physical attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full recovery attack. The methodology is composed of two steps.
Joost Renes +4 more
core
Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka +3 more
doaj +1 more source
DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium [PDF]
In previous years there has been an increased interest in designing threshold signature schemes. Most of the recent works focus on constructing threshold versions of ECDSA or Schnorr signature schemes due to their appealing usage in blockchain ...
Jelizaveta Vakarjuk +2 more
core
Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki +2 more
doaj +1 more source
Zero-Knowledge and Post-Quantum Signature Primitives for Privacy-Preserving Blockchain IoT Systems [PDF]
Security and privacy have emerged as paramount concerns in the evolving Internet of Things (IoT) ecosystem, where billions of interconnected devices exchange sensitive data over untrusted networks.
Dr. Godfrey Wandwi
core +1 more source
Reed-Muller 부호의 동형 연산과 Modified pqsigRM의 개선 [PDF]
학위논문(박사) -- 서울대학교대학원 : 공과대학 전기·정보공학부, 2023. 8. 노종선.In this dissertation, two main contributions are given as; i) homomorphic computation in Reed-Muller (RM) codes and ii) improving Modified pqsigRM with the key size and bit-security.
조진규
core

