Results 61 to 70 of about 1,573 (212)
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy +5 more
wiley +1 more source
In the third round of the NIST Post-Quantum Cryptography standardization project, the focus is on optimizing software and hardware implementations of candidate schemes.
Heinz, Carsten +3 more
core
Hardware Architecture Design for Modular Arithmetic Acceleration in Post-Quantum Lattice-Based Cryptography Algorithms [PDF]
En esta tesis, se presenta el diseño de un módulo de hardware para su integración dentro de las etapas de un procesador RISC-V, el cual es capaz de calcular operaciones aritméticas modulares para los esquemas de criptógrafa post-cuántica CRYSTALS-Kyber ...
José Juan Hernández-Morales
core
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
Pietro Nannipieri +5 more
doaj +1 more source
Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng +7 more
wiley +1 more source
Accelerating Post-Quantum Cryptography Algorithms on the Nvidia Bluefield 3 DPU: An Active Analysis [PDF]
As the development of powerful quantum computers progresses, the threat to public key cryptography posed by the Shor algorithm is becoming increasingly serious.
Meinl, Lukas
core +1 more source
By leveraging the complementarity of Quantum, Post‐Quantum, and Classical Cryptography, the authors design a modular Hybrid Authenticated Cryptosystem with advanced features of forward security and post‐compromise security. In its optimal instantiation, the protocol is information theoretic secure for both authentication and key exchange.
Lydia Garms +9 more
wiley +1 more source
Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes.
Anas A. Abudaqa +2 more
doaj +1 more source
A survey on post‐quantum based approaches for edge computing security
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley +1 more source
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang +3 more
wiley +1 more source

