Results 81 to 90 of about 1,519 (205)

Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series

open access: yesIEEE Access
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim   +2 more
doaj   +1 more source

Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium [PDF]

open access: yes, 2022
The looming threat of an adversary with Quantum computing capability led to a worldwide research effort towards identifying and standardizing novel post-quantum cryptographic primitives.
Anupam Chattopadhyay   +3 more
core  

Edge-enabled quantum-safe real-time vaccine supply chain optimization: a decentralized framework for autonomous decision making [PDF]

open access: yesPeerJ Computer Science
The centralized architectures of global vaccine supply chains pose severe security, latency, and operational efficiency challenges to new threats of quantum computing.
Nirupam Saha   +8 more
doaj   +2 more sources

Redetermination of the low-temperature polymorph of Li2MnSiO4 from single-crystal X-ray data

open access: yesActa Crystallographica Section E, 2012
Crystals of dilithium manganese(II) silicate were grown under high-temperature hydrothermal conditions in the system LiOH—MnO2—SiO2. The title compound crystallizes in the βII-Li3PO4 structure type. The coordination polyhedra
Mineo Sato   +4 more
doaj   +1 more source

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium [PDF]

open access: yes, 2023
We present a set of physical attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full recovery attack. The methodology is composed of two steps.
Joost Renes   +4 more
core  

Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature

open access: yesApplied Sciences
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka   +3 more
doaj   +1 more source

DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium [PDF]

open access: yes, 2023
In previous years there has been an increased interest in designing threshold signature schemes. Most of the recent works focus on constructing threshold versions of ECDSA or Schnorr signature schemes due to their appealing usage in blockchain ...
Jelizaveta Vakarjuk   +2 more
core  

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +1 more source

Zero-Knowledge and Post-Quantum Signature Primitives for Privacy-Preserving Blockchain IoT Systems [PDF]

open access: yes
Security and privacy have emerged as paramount concerns in the evolving Internet of Things (IoT) ecosystem, where billions of interconnected devices exchange sensitive data over untrusted networks.
Dr. Godfrey Wandwi
core   +1 more source

Reed-Muller 부호의 동형 연산과 Modified pqsigRM의 개선 [PDF]

open access: yes, 2023
학위논문(박사) -- 서울대학교대학원 : 공과대학 전기·정보공학부, 2023. 8. 노종선.In this dissertation, two main contributions are given as; i) homomorphic computation in Reed-Muller (RM) codes and ii) improving Modified pqsigRM with the key size and bit-security.
조진규
core  

Home - About - Disclaimer - Privacy