Results 121 to 130 of about 1,573 (212)

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Farooq S   +6 more
europepmc   +1 more source

A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber

open access: yes
CRYSTALS-Kyber (a.k.a. Kyber) has been drafted to be standardized as the only key encapsulation mechanism (KEM) scheme by the national institute of standards and technology (NIST) to withstand attacks by large-scale quantum computers.
Tian, Jing, Wang, Kai, Xu, Dejun
core  

Lattice-based PKEs/KEMs. [PDF]

open access: yesNatl Sci Rev, 2021
Lu X, Zhang J.
europepmc   +1 more source

Using Variational Quantum Algorithm to Solve the LWE Problem. [PDF]

open access: yesEntropy (Basel), 2022
Lv L   +6 more
europepmc   +1 more source

Kleptographic Attacks against Implicit Rejection [PDF]

open access: yes
Given its integral role in modern encryption systems such as CRYSTALS-Kyber, the Fujisaki-Okamoto (FO) transform will soon be at the center of our secure communications infrastructure.
Antoine Joux   +2 more
core  

Real-Time Threat Mitigation In Financial IT Infrastructure Using Quantum Computing [PDF]

open access: yes
Financial institutions continue to face evolving cyber security threats that require immediate detection and mitigation to prevent significant damage. Classical-based cyber-security mechanisms struggle to keep up with these emerging threats due to their ...
Ryszard, Romaniuk   +1 more
core   +1 more source

A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. [PDF]

open access: yesSensors (Basel), 2022
Septien-Hernandez JA   +3 more
europepmc   +1 more source

Quantum-resistance in blockchain networks. [PDF]

open access: yesSci Rep, 2023
Allende M   +13 more
europepmc   +1 more source

Towards Side-Channel Infrastructure for Software Implementations of PQC Algorithms [PDF]

open access: yes
Post-Quantum Cryptography (PQC) is a new class of asymmetric cryptography algorithms that are supposed to be secure against both classical computers and quantum computers through Shor’s algorithm.
Teague, Tristen
core   +3 more sources

Home - About - Disclaimer - Privacy