Results 91 to 100 of about 1,573 (212)

Power Analytic Attacks on CRYSTALS-Kyber

open access: yes, 2023
Denne avhandlingen undersøker effekten av effektanalytiske sidekanalangrep på den kvantesikre nøkkelkapslingsalgoritmen CRYSTALS-Kyber. Vi gjenskapte og forbedret et tidligere korrelasjonsangrep utført av Karlov et al. Vi implementerte Kyber512 i ChipWhisperer-systemet og utførte angrepet tre ganger, med effektmålinger fra 1000, 200 og 50 ...
openaire   +1 more source

LOKI Low-Latency Open-Source Kyber-Accelerator IPs [PDF]

open access: yes
CRYSTALS-Kyber is a lattice-based key encapsulation mechanism (KEM) recognized as one of the finalist algorithms in NIST’s post-quantum cryptography (PQC) standardization process.
Dolmeta, Alessandra   +3 more
core   +1 more source

Side-Channel Attacks on CRYSTALS Kyber: An analysis of a post-quantum algorithm and its vulnerabilities to sidechannel attacks [PDF]

open access: yes, 2023
Den potensielle fremveksten av kvantedatamaskiner utgjør en trussel mot dagens krypteringsstandarder. CRYSTALS Kyber er en post-kvante, gitterbasert nøkkelinnkapslingsmekanisme (Key-Encapsulation Mechanism", KEM) som brukes til å utveksle et sett med ...
Grünfeld, J. Mathias H.
core  

RISC-V Based Keccak Co-Processor for NIST Post-Quantum Cryptography Standards [PDF]

open access: yes
This paper presents the design and implementation of a RISC-V-based Keccak co-processor optimized for Post-Quantum Cryptography (PQC) algorithms.
Dolmeta, Alessandra   +4 more
core   +1 more source

Security Analysis for BB84 Key Distillation [PDF]

open access: yes
Key distillation, also referred to as classical post-processing, plays a pivotal role in Quantum Key Distribution (QKD) protocols. Key distillation encompasses numerous subroutines, making the analysis of its overall security implications potentially ...
Halunen, Kimmo   +2 more
core   +1 more source

Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series

open access: yesIEEE Access
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim   +2 more
doaj   +1 more source

UPP-NTT: A Unified Parallel Pipelined NTT Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography

open access: yesIEEE Access
In lattice-based post-quantum cryptographic schemes, the Number Theoretic Transform (NTT) is a core computational operation that enables efficient polynomial multiplication in algorithms such as CRYSTALS-Kyber.
P. Ramyavani   +5 more
doaj   +1 more source

An Efficient and Unified RTL Accelerator Design for HQC-128, HQC-192, and HQC-256 [PDF]

open access: yes
In the Post-Quantum Standardization (PQC) process held by the National Institute of Standards and Technology (NIST), the final round of evaluation of the asymmetric cryptographic schemes Classic McEliece}, BIKE and HQC will elect the alternative Key ...
Alessandro Barenghi   +2 more
core   +1 more source

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +1 more source

Probabilistic modeling of decryption-failure bounds in CRYSTALS-Kyber under the post-quantum threat model

open access: yesMachine Learning: Science and Technology
We present a probabilistic modeling framework for quantifying decryption-failure probability (DFP) in CRYSTALS–Kyber , the lattice-based key encapsulation mechanism standardized by National Institute of Standards and Technology as module-lattice-based ...
Cemil Emre Yavas   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy