Results 61 to 70 of about 1,573 (212)

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

PQC-HA: A Framework for Prototyping and In-Hardware Evaluation of Post-Quantum Cryptography Hardware Accelerators

open access: yes, 2023
In the third round of the NIST Post-Quantum Cryptography standardization project, the focus is on optimizing software and hardware implementations of candidate schemes.
Heinz, Carsten   +3 more
core  

Hardware Architecture Design for Modular Arithmetic Acceleration in Post-Quantum Lattice-Based Cryptography Algorithms [PDF]

open access: yes, 2023
En esta tesis, se presenta el diseño de un módulo de hardware para su integración dentro de las etapas de un procesador RISC-V, el cual es capaz de calcular operaciones aritméticas modulares para los esquemas de criptógrafa post-cuántica CRYSTALS-Kyber ...
José Juan Hernández-Morales
core  

A RISC-V Post Quantum Cryptography Instruction Set Extension for Number Theoretic Transform to Speed-Up CRYSTALS Algorithms

open access: yesIEEE Access, 2021
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
Pietro Nannipieri   +5 more
doaj   +1 more source

Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng   +7 more
wiley   +1 more source

Accelerating Post-Quantum Cryptography Algorithms on the Nvidia Bluefield 3 DPU: An Active Analysis [PDF]

open access: yes
As the development of powerful quantum computers progresses, the threat to public key cryptography posed by the Shor algorithm is becoming increasingly serious.
Meinl, Lukas
core   +1 more source

Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem

open access: yesAdvanced Quantum Technologies, Volume 7, Issue 4, April 2024.
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms   +9 more
wiley   +1 more source

On the Homomorphic Properties of Kyber and McEliece with Application to Post-Quantum Private Set Intersection

open access: yesCryptography
Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes.
Anas A. Abudaqa   +2 more
doaj   +1 more source

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy