Results 21 to 30 of about 1,573 (212)

Criptografía lattice-based en la era cuántica: una revisión [PDF]

open access: yes, 2023
The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators ...
Cisneros, Mauricio, Olazabal, Javier
core   +2 more sources

Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber

open access: yes2023 18th Conference on Ph.D Research in Microelectronics and Electronics (PRIME), 2023
Post-quantum cryptography represents a category of cryptosystems resistant to quantum algorithms. Such schemes are under the scrutiny of their mathematical security in the context of the NIST standardization process, but they are not side-channel secure at the algorithm level.
Carrera Rodriguez, Rafael   +3 more
openaire   +2 more sources

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM [PDF]

open access: yes2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018
Rapid advances in quantum computing, together with the announcement by the National Institute of Standards and Technology (NIST) to define new standards for digitalsignature, encryption, and key-establishment protocols, have created significant interest in post-quantum cryptographic schemes. This paper introduces Kyber (part of CRYSTALS – Cryptographic
Bos, Joppe   +8 more
openaire   +2 more sources

Secure post‐quantum group key exchange: Implementing a solution based on Kyber

open access: yesIET Communications, Volume 17, Issue 6, Page 758-773, April 2023., 2023
In this article, the authors report on the implementation of a post‐quantum group key exchange protocol, which is proven secure in the so‐called Quantum Random Oracle Model. It is based on a two‐party design called Kyber, which is a finalist in the NIST standardization contest for post‐quantum cryptographic designs.
José Ignacio Escribano Pablos   +1 more
wiley   +1 more source

Implementation and integration of Keccak accelerator on RISC-V for CRYSTALS-Kyber [PDF]

open access: yes, 2023
One of the key metrics used for defying the security of the Internet of Things (IoT) is data integrity, which mostly relies on the use of cryptographic hash functions. In the last years, the National Institute of Standards and Technology (NIST) announced
Alessandra Dolmeta   +3 more
core   +1 more source

Efficient, Error-Resistant NTT Architectures for CRYSTALS-Kyber FPGA Accelerators

open access: yes2023 IFIP/IEEE 31st International Conference on Very Large Scale Integration (VLSI-SoC), 2023
The dawn of cost-effective miniaturised satellites is currently attracting venture capital in a never seen before ratio to launch mega-constellations of satellites for a diverse range of applications. These satellites are vulnerable to attacks by high-capability cyber-criminals (including quantum enabled adversaries), due to the critical data they ...
Khan, Safiullah   +6 more
openaire   +4 more sources

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, Volume 17, Issue 2, Page 227-243, March 2023., 2023
Abstract The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives. Due to solid security and desirable performance, lattice‐based cryptosystems are viewed as promising candidates in the upcoming ...
Anyu Wang, Dianyan Xiao, Yang Yu
wiley   +1 more source

Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention.
Melissa Azouaoui   +3 more
doaj   +3 more sources

Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
The module learning with errors (MLWE) problem has attracted considerable attention for its tradeoff between security and efficiency. The quantum/classical worst‐case to average‐case hardness for the MLWE problem (or more exactly, a family of problems) has been established, but most of the known results require the seed distribution to be the uniform ...
Wenjuan Jia, Baocang Wang, Youwen Zhu
wiley   +1 more source

HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining

open access: yesIEEE Transactions on Computers, 2023
CRYSTALS-Kyber (Kyber) was recently chosen as the first quantum resistant Key Encapsulation Mechanism (KEM) scheme for standardisation, after three rounds of the National Institute of Standards and Technology (NIST) initiated PQC competition which begin in 2016 and search of the best quantum resistant KEMs and digital signatures.
Ziying Ni   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy