Results 111 to 120 of about 1,573 (212)
Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems.
Jesus Algar-Fernandez +3 more
doaj +1 more source
Analysis and contributions to an open source Kyber library in Rust [PDF]
This work focuses on analyzing the efficiency of a purely Rust-written Kyber library for ARM Cortex-M4 microcontrollers. The analysis includes performance comparisons with a C-written Kyber library, as well as the identification and resolution of minor ...
Di Scala, Antonio Jose +3 more
core +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization
CRYSTALS-Kyber has been selected by the NIST as a post-quantum public-key encryption and key establishment algorithm to be standardized. This makes it important to develop side-channel attack resistant implementations of CRYSTALS-Kyber. In this paper, we propose utilizing duplication combined with clock randomization as a means of protecting CRYSTALS ...
Michail Moraitis +5 more
openaire +2 more sources
In the modern era of the Internet of Things (IoT), especially with the rapid development of quantum computers, the implementation of postquantum cryptography algorithms in numerous terminals allows them to defend against potential future quantum attack ...
Binh Kieu-Do-Nguyen +6 more
doaj +1 more source
Analysis of the Crystals-Kyber Implementation
Meetings on Computer Algebra and Applications (EACA 2024), Satellite conference of the 9th European Congress of Mathematics (9ECM) Del 26 al 28 de junio de 2024, El Escorial, Madrid.
Rojas Rodríguez, Diego +1 more
openaire +1 more source
Post-Quantum Key Exchange in TLS 1.3: Further Analysis on Performance of New Cryptographic Standards
The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS).
Konstantina Souvatzidaki +1 more
doaj +1 more source
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. [PDF]
Xu S +5 more
europepmc +1 more source
Мета роботи: дослідити ризики для безпеки інформації, які створюють квантові атаки, зокрема з використанням алгоритму Шора для факторизації великих чисел за допомогою бібліотеки Qiskit.
Roman Shkliarskyy, Danyil Zhuravchak
doaj +1 more source
A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World. [PDF]
Cultice T, Clark J, Yang W, Thapliyal H.
europepmc +1 more source

