Results 111 to 120 of about 1,573 (212)

Benchmarking Post-Quantum Signatures and KEMs on General-Purpose CPUs Using a TCP Client–Server Testbed

open access: yesComputers
Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems.
Jesus Algar-Fernandez   +3 more
doaj   +1 more source

Analysis and contributions to an open source Kyber library in Rust [PDF]

open access: yes
This work focuses on analyzing the efficiency of a purely Rust-written Kyber library for ARM Cortex-M4 microcontrollers. The analysis includes performance comparisons with a C-written Kyber library, as well as the identification and resolution of minor ...
Di Scala, Antonio Jose   +3 more
core   +1 more source

Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization

open access: yesIEEE Design & Test
CRYSTALS-Kyber has been selected by the NIST as a post-quantum public-key encryption and key establishment algorithm to be standardized. This makes it important to develop side-channel attack resistant implementations of CRYSTALS-Kyber. In this paper, we propose utilizing duplication combined with clock randomization as a means of protecting CRYSTALS ...
Michail Moraitis   +5 more
openaire   +2 more sources

Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme

open access: yesInformation
In the modern era of the Internet of Things (IoT), especially with the rapid development of quantum computers, the implementation of postquantum cryptography algorithms in numerous terminals allows them to defend against potential future quantum attack ...
Binh Kieu-Do-Nguyen   +6 more
doaj   +1 more source

Analysis of the Crystals-Kyber Implementation

open access: yes
Meetings on Computer Algebra and Applications (EACA 2024), Satellite conference of the 9th European Congress of Mathematics (9ECM) Del 26 al 28 de junio de 2024, El Escorial, Madrid.
Rojas Rodríguez, Diego   +1 more
openaire   +1 more source

Post-Quantum Key Exchange in TLS 1.3: Further Analysis on Performance of New Cryptographic Standards

open access: yesCryptography
The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS).
Konstantina Souvatzidaki   +1 more
doaj   +1 more source

Дослідження вразливостей алгоритму RSA через атаки на факторизацію, реалізовані за допомогою квантових обчислень

open access: yesSocial Development & Security
Мета роботи: дослідити ризики для безпеки інформації, які створюють квантові атаки, зокрема з використанням алгоритму Шора для факторизації великих чисел за допомогою бібліотеки Qiskit.
Roman Shkliarskyy, Danyil Zhuravchak
doaj   +1 more source

Home - About - Disclaimer - Privacy