Results 101 to 110 of about 1,573 (212)

NSEA: A Resilient ERP Framework Integrating Quantum-Safe Cryptography and Neuro-Symbolic Reasoning for Industrial Adaptability

open access: yesIEEE Access
This study proposes a neurosymbolic ERP architecture (NSEA) incorporating post-quantum cryptographic protocols to enable real-time cybersecurity and adaptive operational optimization. NSEA integrates CRYSTALS-Kyber lattice-based post-quantum cryptography
Yong Lin, Yadi Lin
doaj   +1 more source

Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation

open access: yesCryptography
CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024.
Costin Ghiban, Marios Omar Choudary
doaj   +1 more source

MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
CRYSTALS-Kyber, one of the NIST PQC standardization schemes, has garnered considerable attention from researchers in recent years for its side-channel security.
Fan Huang   +4 more
doaj   +1 more source

Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities

open access: yes, 2023
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes.
Aghapour, Saeed   +4 more
core  

A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm

open access: yesInformation
Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. NTT-based polynomials’ multiplication relies on the computation of forward number theoretic transform (FNTT) and inverse ...
Muhammad Rashid   +4 more
doaj   +1 more source

Bitstream Fault Injection Attacks on CRYSTALS Kyber Implementations on FPGAs

open access: yes2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)
CRYSTALS-Kyber is the only Public-key Encryption (PKE)/ Key-encapsulation Mechanism (KEM) scheme that was chosen for standardization by the National Institute of Standards and Technology initiated Post-quantum Cryptography competition (so called NIST PQC). In this paper, we show the first successfully malicious modifications of the bitstream of a Kyber
Ni, Ziying   +3 more
openaire   +2 more sources

Quantum-Safe Threshold Cryptography for Decentralized Group Key Management via Dealerless DKG (CRYSTALS–Kyber)

open access: yesMathematics
Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS–Kyber ...
P.S. Renisha, Bhawana Rudra
doaj   +1 more source

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

Some Mathematical Problems Behind Lattice-Based Cryptography

open access: yesCryptography
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj   +1 more source

Home - About - Disclaimer - Privacy