Results 101 to 110 of about 1,573 (212)
This study proposes a neurosymbolic ERP architecture (NSEA) incorporating post-quantum cryptographic protocols to enable real-time cybersecurity and adaptive operational optimization. NSEA integrates CRYSTALS-Kyber lattice-based post-quantum cryptography
Yong Lin, Yadi Lin
doaj +1 more source
Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation
CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024.
Costin Ghiban, Marios Omar Choudary
doaj +1 more source
CRYSTALS-Kyber, one of the NIST PQC standardization schemes, has garnered considerable attention from researchers in recent years for its side-channel security.
Fan Huang +4 more
doaj +1 more source
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes.
Aghapour, Saeed +4 more
core
A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm
Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. NTT-based polynomials’ multiplication relies on the computation of forward number theoretic transform (FNTT) and inverse ...
Muhammad Rashid +4 more
doaj +1 more source
Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network. [PDF]
Wang M, Zhang W, Guo J, Song X, Long G.
europepmc +1 more source
Bitstream Fault Injection Attacks on CRYSTALS Kyber Implementations on FPGAs
CRYSTALS-Kyber is the only Public-key Encryption (PKE)/ Key-encapsulation Mechanism (KEM) scheme that was chosen for standardization by the National Institute of Standards and Technology initiated Post-quantum Cryptography competition (so called NIST PQC). In this paper, we show the first successfully malicious modifications of the bitstream of a Kyber
Ni, Ziying +3 more
openaire +2 more sources
Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS–Kyber ...
P.S. Renisha, Bhawana Rudra
doaj +1 more source
Post-Quantum Security: Opportunities and Challenges. [PDF]
Li S +7 more
europepmc +1 more source
Some Mathematical Problems Behind Lattice-Based Cryptography
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj +1 more source

