Results 11 to 20 of about 371 (175)
Length–Weight Distribution of Non-Zero Elements in Randomized Bit Sequences [PDF]
Randomness plays an important role in data communication as well as in cybersecurity. In the simulation of communication systems, randomized bit sequences are often used to model a digital source information stream. Cryptographic outputs should look more
Christoph Lange +3 more
doaj +2 more sources
First end‐to‐end PQC protected DPU‐to‐DPU communications
The appearance of quantum computing in the short foreseeable future and its capability to break conventional cryptographic algorithms forces to change the paradigm of secure real‐time communications.
A. Cano Aguilera +4 more
doaj +2 more sources
Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber
Post-quantum cryptography represents a category of cryptosystems resistant to quantum algorithms. Such schemes are under the scrutiny of their mathematical security in the context of the NIST standardization process, but they are not side-channel secure at the algorithm level.
Rafael Carrera Rodriguez +3 more
openalex +4 more sources
The imminent rise of practical quantum computing threatens well-established cryptography algorithms for secret key exchange in use today, such as Diffie-Hellman, RSA and Elliptic Curve based schemes.
Carlos Gewehr +2 more
doaj +2 more sources
The Mathematical Foundation of Post-Quantum Cryptography [PDF]
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, a Canadian company D-Wave demonstrated the first quantum computer.
Chuanming Zong
doaj +2 more sources
Post-Quantum Security: Opportunities and Challenges [PDF]
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything
Silong Li +7 more
doaj +2 more sources
Estudos de otimização do algoritmo de criptografia pós-quântica CRYSTALS-KYBER
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based post-quantum cryptography (PQC) schemes. CRYSTALS-KYBER is a lattice-based key encapsulation mechanism (KEM) and it was recently announced as one of the four finalists at round three in NIST's PQC Standardization.
Luiz F. C. Ferro +2 more
openalex +4 more sources
Semi-Compressed CRYSTALS-Kyber [PDF]
In this paper, we investigate the communication overhead of the Kyber, which has recently been standardized by the National Institute of Standards and Technology (NIST). Given the same decryption failure rate (DFR) and security argument, we show it is feasible to reduce the communication overhead of the Kyber by 54%.
Shuiyin Liu, Amin Sakzad
openalex +3 more sources
VHDL-based implementation of CRYSTALS-Kyber components on FPGA [PDF]
CRYSTALS-Kyber is one of the finalists of the National Institute of Standards and Technology (NIST) post-quantum cryptography competition. In this paper, we deal with effective hardware-accelerated implementations of components intended for the use in the FPGA (Field Programmable Gate Array) implementation of the above-mentioned lattice-based ...
Petr Jedlička, Jan Hajný
openalex +3 more sources
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised.
Maksim Iavich, Tamari Kuchukhidze
doaj +2 more sources

