Results 11 to 20 of about 1,573 (212)
A lightweight hardware implementation of CRYSTALS-Kyber
The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future. Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post ...
Shiyang He, Hui Li, Fenghua Li, Ruhui Ma
doaj +2 more sources
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised.
Maksim Iavich, Tamari Kuchukhidze
doaj +2 more sources
Efficient number theoretic transform accelerator for CRYSTALS-Kyber [PDF]
The national institute of standards and technology (NIST) has presented its draft of the module-lattice-based key-encapsulation mechanism standard (MLBKEMS), choosing cryptographic suite for algebraic lattices (CRYSTALS)- Kyber as the base encryption ...
Anh Pham, Hoang +4 more
core +3 more sources
Semi-Compressed CRYSTALS-Kyber
In this paper, we investigate the communication overhead of the Kyber, which has recently been standardized by the National Institute of Standards and Technology (NIST).
Liu, Shuiyin, Sakzad, Amin
core +2 more sources
Hardware acceleration for high-volume operations of CRYSTALS-Kyber and CRYSTALS-Dilithium [PDF]
Many high-demand digital services need to perform several cryptographic operations, such as key exchange or security credentialing, in a concise amount of time.
Carril Gil, Xavier +7 more
core +4 more sources
Lattice Codes for CRYSTALS-Kyber
This paper describes a constant-time lattice encoder for the National Institute of Standards and Technology (NIST) recommended post-quantum encryption algorithm: Kyber. The first main contribution of this paper is to refine the analysis of Kyber decoding
Liu, Shuiyin, Sakzad, Amin
core +2 more sources
A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber [PDF]
NIST has recently selected CRYSTALS-Kyber as a new public key encryption and key establishment algorithm to be standardized. This makes it important to evaluate the resistance of CRYSTALS-Kyber implementations to side-channel attacks.
Elena Dubrova, Yanning Ji
core +2 more sources
Applying the Simple Partial Discard Method to Crystals-Kyber
In certain cryptographic applications random numbers are required (e.g., when generating cryptographic keys and generating digital signatures). To obtain these random numbers, the typical approach involves obtaining random bits first and then converting ...
Dongyoung Roh, Sangim Jung
doaj +2 more sources
Towards CRYSTALS-Kyber VHDL Implementation [PDF]
Kyber is one of the three finalists of the National Institute of Standards and Technology (NIST) post-quantum cryptography competition. This article presents an optimized Very High Speed Integrated Circuit Hardware Description Language (VHDL)-based implementation of the main components of the Kyber scheme, namely Number-Theoretic Transform (NTT) and ...
Ricci, Sara +5 more
openaire +2 more sources
Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM
Continuous Key Agreement (CKA) is a two-party protocol used in double-ratchet protocols such as signal. It enables continuous and synchronous key distribution that generates a fresh key to encrypt each transaction in messenger apps. It guarantees forward
Joohee Lee, Jihoon Kwon, Ji Sun Shin
doaj +1 more source

