Results 61 to 70 of about 371 (175)

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs

open access: yesIEEE Access, 2020
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim   +8 more
doaj   +1 more source

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang   +3 more
wiley   +1 more source

Post-Quantum Authentication in the MQTT Protocol

open access: yesJournal of Cybersecurity and Privacy, 2023
Message Queue Telemetry Transport (MQTT) is a common communication protocol used in the Internet of Things (IoT). MQTT is a simple, lightweight messaging protocol used to establish communication between multiple devices relying on the publish–subscribe ...
Juliet Samandari, Clémentine Gritti
doaj   +1 more source

PSESV: A hybrid post-quantum encryption Framework with real-time thermal and EM side-channel attack detection

open access: yesAin Shams Engineering Journal
The rapid progress of quantum computing threatens the long-term security of classical public-key cryptosystems, thereby necessitating an urgent transition toward post-quantum cryptography (PQC).
Donagani Ramakrishna, Mohammed Ali Shaik
doaj   +1 more source

Resilience of Post-Quantum Cryptography in Lightweight IoT Protocols: A Systematic Review

open access: yesEng
The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud communications ...
Mohammed Almutairi, Frederick T. Sheldon
doaj   +1 more source

A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard.
Zewen Ye   +5 more
doaj   +1 more source

Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)

open access: yesInformation
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI).
Qaiser Khan   +2 more
doaj   +1 more source

Deep Learning Enhanced Side Channel Analysis on CRYSTALS-Kyber

open access: yes2024 25th International Symposium on Quality Electronic Design (ISQED)
The combination of Deep-learning (DL) and Sidechannel analysis (SCA) has been proven by several attacks targeting symmetric key cryptography implementations such as AES. This paper aims to demonstrate the effectiveness of DL in attacking a Post Quantum CRYSTALS-Kyber implementation to recover the private key.
Hoang, Anh-Tuan   +6 more
openaire   +4 more sources

Efficient number theoretic transform accelerator for CRYSTALS-Kyber

open access: yesIndonesian Journal of Electrical Engineering and Computer Science
<p>The national institute of standards and technology (NIST) has presented its draft of the module-lattice-based key-encapsulation mechanism standard (MLBKEMS), choosing cryptographic suite for algebraic lattices (CRYSTALS)- Kyber as the base encryption.
Toan Nguyen   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy