Results 51 to 60 of about 1,573 (212)
Verification of the (1–δ)-Correctness Proof of CRYSTALS-KYBER with Number Theoretic Transform [PDF]
This paper describes a formalization of the specification and the algorithm of the cryptographic scheme CRYSTALS-KYBER as well as the verification of its (1 − δ)-correctness proof.
Katharina Kreuzer
core
CRYSTAL-Kyber (Kyber) is one of the post-quantum cryptography (PQC) key-encapsulation mechanism (KEM) schemes selected during the standardization process.
Lao, Yingjie +2 more
core +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source
The imminent rise of practical quantum computing threatens well-established cryptography algorithms for secret key exchange in use today, such as Diffie-Hellman, RSA and Elliptic Curve based schemes.
Carlos Gewehr +2 more
doaj +1 more source
Criptografía basada en retículas: desarrollo y análisis de una nueva variante del algoritmo Crystals-Kyber [PDF]
The imminent arrival of quantum computing has accelerated the need for cryptographic systems resistant to quantum attacks. Such attacks exploit the vulnerability in private and public key encryption systems, where the public key is derived from the ...
Cisneros Laule, Mauricio Sebastian +2 more
core +2 more sources
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley +1 more source
Making the Transition to Post-Quantum Cryptography [PDF]
Without intervention, quantum computing could threaten the security of a large portion of our internet in the near future. However, solutions exist. This paper, which is intended for a general audience, provides a wider context for our current state of ...
Richard, J. Simon
core +1 more source
Post-quantum cryptography [PDF]
I denne bacheloroppgaven, ser vi på CRYSTALS Kyber, en CCA2 kvante-resistante Key Encapsulation Mechanism, hvordan den er konstruert og dens sikkerhet. Vi kommer også til å se på Module Learning With Error Problemet.
Hageli, Sander Støle
core
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley +1 more source

