Results 121 to 130 of about 1,573 (212)
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S +6 more
europepmc +1 more source
A Hardware-Friendly Shuffling Countermeasure Against Side-Channel Attacks for Kyber
CRYSTALS-Kyber (a.k.a. Kyber) has been drafted to be standardized as the only key encapsulation mechanism (KEM) scheme by the national institute of standards and technology (NIST) to withstand attacks by large-scale quantum computers.
Tian, Jing, Wang, Kai, Xu, Dejun
core
Using Variational Quantum Algorithm to Solve the LWE Problem. [PDF]
Lv L +6 more
europepmc +1 more source
Kleptographic Attacks against Implicit Rejection [PDF]
Given its integral role in modern encryption systems such as CRYSTALS-Kyber, the Fujisaki-Okamoto (FO) transform will soon be at the center of our secure communications infrastructure.
Antoine Joux +2 more
core
Real-Time Threat Mitigation In Financial IT Infrastructure Using Quantum Computing [PDF]
Financial institutions continue to face evolving cyber security threats that require immediate detection and mitigation to prevent significant damage. Classical-based cyber-security mechanisms struggle to keep up with these emerging threats due to their ...
Ryszard, Romaniuk +1 more
core +1 more source
Hybrid post-quantum Transport Layer Security formal analysis in Maude-NPA and its parallel version. [PDF]
Tran DD, Do CM, Escobar S, Ogata K.
europepmc +1 more source
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. [PDF]
Septien-Hernandez JA +3 more
europepmc +1 more source
Quantum-resistance in blockchain networks. [PDF]
Allende M +13 more
europepmc +1 more source
Towards Side-Channel Infrastructure for Software Implementations of PQC Algorithms [PDF]
Post-Quantum Cryptography (PQC) is a new class of asymmetric cryptography algorithms that are supposed to be secure against both classical computers and quantum computers through Shor’s algorithm.
Teague, Tristen
core +3 more sources

