Results 1 to 10 of about 371 (175)

Area-time efficient pipelined number theoretic transform for CRYSTALS-Kyber. [PDF]

open access: goldPLoS ONE
CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. The bottleneck in performance of Kyber is the polynomial multiplication
Ayesha Waris   +2 more
doaj   +5 more sources

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber [PDF]

open access: goldApplied Sciences, 2022
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen   +3 more
doaj   +3 more sources

Pipelined and conflict-free number theoretic transform accelerator for CRYSTALS-Kyber on FPGA. [PDF]

open access: goldPLoS ONE
Post-quantum cryptographic (PQC) algorithms are essential due to the threat posed by quantum computers to the security of currently deployed cryptosystems.
Ayesha Waris   +2 more
doaj   +4 more sources

A lightweight hardware implementation of CRYSTALS-Kyber

open access: diamondJournal of Information and Intelligence
The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future. Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post ...
Shiyang He, Hui Li, Fenghua Li, Ruhui Ma
doaj   +3 more sources

Applying the Simple Partial Discard Method to Crystals-Kyber [PDF]

open access: goldIEEE Access
In certain cryptographic applications random numbers are required (e.g., when generating cryptographic keys and generating digital signatures). To obtain these random numbers, the typical approach involves obtaining random bits first and then converting ...
Dongyoung Roh, Sangim Jung
doaj   +3 more sources

Lattice Codes for CRYSTALS-Kyber [PDF]

open access: goldDesigns, Codes and Cryptography, 2023
<p>This letter describes a lattice encoder for the NIST-recommended post-quantum encryption algorithm: Kyber. The key idea is to refine the analysis of Kyber decoding noise. We prove that Kyber decoding noise can be bounded by a sphere. This result shows the Kyber encoding problem is essentially a sphere packing in a hypercube.
Shuiyin Liu, Amin Sakzad
  +5 more sources

Towards CRYSTALS-Kyber VHDL Implementation [PDF]

open access: goldProceedings of the 18th International Conference on Security and Cryptography, 2021
Kyber is one of the three finalists of the National Institute of Standards and Technology (NIST) post-quantum cryptography competition. This article presents an optimized Very High Speed Integrated Circuit Hardware Description Language (VHDL)-based implementation of the main components of the Kyber scheme, namely Number-Theoretic Transform (NTT) and ...
Sara Ricci   +5 more
openalex   +3 more sources

The Feasibility of the CRYSTALS-Kyber Scheme for Smart Metering Systems

open access: goldIEEE Access, 2022
This paper investigates the feasibility of a quantum-secure Key Encapsulation Mechanism (KEM) in hardware constrained Smart Meter (SM) equipment. In this sense, the Cryptographic Suite for Algebraic Lattices (CRYSTALS)-Kyber scheme, the new standard for ...
Vinicius L. R. Da Costa   +3 more
doaj   +2 more sources

CRYSTALS-Kyber With Lattice Quantizer [PDF]

open access: green2024 IEEE International Symposium on Information Theory (ISIT)
Module Learning with Errors (M-LWE) based key reconciliation mechanisms (KRM) can be viewed as quantizing an M-LWE sample according to a lattice codebook. This paper describes a generic M-LWE-based KRM framework, valid for any dimensional lattices and any modulus $q$ without a dither. Our main result is an explicit upper bound on the decryption failure
Shuiyin Liu, Amin Sakzad
openalex   +3 more sources

Post-Quantum Wireless-Based Key Encapsulation Mechanism via CRYSTALS-Kyber for Resource-Constrained Devices [PDF]

open access: greenIEEE Access
We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems.
M. A. Gonzalez de la Torre   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy