Results 1 to 10 of about 1,573 (212)

First end‐to‐end PQC protected DPU‐to‐DPU communications [PDF]

open access: yesElectronics Letters, 2023
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera   +4 more
doaj   +5 more sources

Area-time efficient pipelined number theoretic transform for CRYSTALS-Kyber. [PDF]

open access: yesPLoS ONE
CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. The bottleneck in performance of Kyber is the polynomial multiplication
Ayesha Waris   +2 more
doaj   +4 more sources

Pipelined and conflict-free number theoretic transform accelerator for CRYSTALS-Kyber on FPGA. [PDF]

open access: yesPLoS ONE
Post-quantum cryptographic (PQC) algorithms are essential due to the threat posed by quantum computers to the security of currently deployed cryptosystems.
Ayesha Waris   +2 more
doaj   +3 more sources

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

open access: yesApplied Sciences, 2022
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen   +3 more
doaj   +2 more sources

Length–Weight Distribution of Non-Zero Elements in Randomized Bit Sequences [PDF]

open access: yesSensors
Randomness plays an important role in data communication as well as in cybersecurity. In the simulation of communication systems, randomized bit sequences are often used to model a digital source information stream. Cryptographic outputs should look more
Christoph Lange   +3 more
doaj   +2 more sources

The Mathematical Foundation of Post-Quantum Cryptography [PDF]

open access: yesResearch
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, a Canadian company D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj   +2 more sources

Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution [PDF]

open access: yesComputers
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei   +3 more
doaj   +4 more sources

The Feasibility of the CRYSTALS-Kyber Scheme for Smart Metering Systems

open access: yesIEEE Access, 2022
This paper investigates the feasibility of a quantum-secure Key Encapsulation Mechanism (KEM) in hardware constrained Smart Meter (SM) equipment. In this sense, the Cryptographic Suite for Algebraic Lattices (CRYSTALS)-Kyber scheme, the new standard for ...
Vinicius L. R. Da Costa   +3 more
doaj   +1 more source

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

open access: yesApplied Sciences, 2023
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song   +4 more
doaj   +1 more source

Hardware architecture for CRYSTALS-Kyber post-quantum cryptographic SHA-3 primitives [PDF]

open access: yes, 2023
Once powerful enough quantum computers become feasible, many of the regularly used cryptosystems will be completely useless. Thus, designing quantum-safe cryptosystems to replace current algorithms is more crucial than ever.
Dolmeta, Alessandra   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy