Results 11 to 20 of about 371 (175)

Length–Weight Distribution of Non-Zero Elements in Randomized Bit Sequences [PDF]

open access: yesSensors
Randomness plays an important role in data communication as well as in cybersecurity. In the simulation of communication systems, randomized bit sequences are often used to model a digital source information stream. Cryptographic outputs should look more
Christoph Lange   +3 more
doaj   +2 more sources

First end‐to‐end PQC protected DPU‐to‐DPU communications

open access: yesElectronics Letters, 2023
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera   +4 more
doaj   +2 more sources

Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber

open access: green2023 18th Conference on Ph.D Research in Microelectronics and Electronics (PRIME), 2023
Post-quantum cryptography represents a category of cryptosystems resistant to quantum algorithms. Such schemes are under the scrutiny of their mathematical security in the context of the NIST standardization process, but they are not side-channel secure at the algorithm level.
Rafael Carrera Rodriguez   +3 more
openalex   +4 more sources

Hardware Acceleration of Crystals-Kyber in Low-Complexity Embedded Systems With RISC-V Instruction Set Extensions

open access: goldIEEE Access
The imminent rise of practical quantum computing threatens well-established cryptography algorithms for secret key exchange in use today, such as Diffie-Hellman, RSA and Elliptic Curve based schemes.
Carlos Gewehr   +2 more
doaj   +2 more sources

The Mathematical Foundation of Post-Quantum Cryptography [PDF]

open access: yesResearch
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, a Canadian company D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj   +2 more sources

Post-Quantum Security: Opportunities and Challenges [PDF]

open access: yesSensors, 2023
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything
Silong Li   +7 more
doaj   +2 more sources

Estudos de otimização do algoritmo de criptografia pós-quântica CRYSTALS-KYBER

open access: gold2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based post-quantum cryptography (PQC) schemes. CRYSTALS-KYBER is a lattice-based key encapsulation mechanism (KEM) and it was recently announced as one of the four finalists at round three in NIST's PQC Standardization.
Luiz F. C. Ferro   +2 more
openalex   +4 more sources

Semi-Compressed CRYSTALS-Kyber [PDF]

open access: green
In this paper, we investigate the communication overhead of the Kyber, which has recently been standardized by the National Institute of Standards and Technology (NIST). Given the same decryption failure rate (DFR) and security argument, we show it is feasible to reduce the communication overhead of the Kyber by 54%.
Shuiyin Liu, Amin Sakzad
openalex   +3 more sources

VHDL-based implementation of CRYSTALS-Kyber components on FPGA [PDF]

open access: goldProceedings II of the 28st Conference STUDENT EEICT 2022: Selected papers., 2022
CRYSTALS-Kyber is one of the finalists of the National Institute of Standards and Technology (NIST) post-quantum cryptography competition. In this paper, we deal with effective hardware-accelerated implementations of components intended for the use in the FPGA (Field Programmable Gate Array) implementation of the above-mentioned lattice-based ...
Petr Jedlička, Jan Hajný
openalex   +3 more sources

Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation

open access: yesCryptography
Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised.
Maksim Iavich, Tamari Kuchukhidze
doaj   +2 more sources

Home - About - Disclaimer - Privacy