Results 71 to 80 of about 371 (175)

RESOURCE-EFFICIENT FPGA IMPLEMENTATION OF CRYSTAL KYBER: ACHIEVING ULTRA-LOW POWER POST-QUANTUM CRYPTOGRAPHY WITH MINIMAL HARDWARE FOOTPRINT [PDF]

open access: yesJournal of Mechanics of Continua and Mathematical Sciences
Quantum computing represents both a major technological advance and an existential danger to contemporary encryption systems. Shor's algorithm can efficiently factor large integers and solve discrete logarithm problems on quantum computers, thereby ...
Bhushan Bhimrao Chavan   +3 more
doaj   +1 more source

High-Efficiency Multi-Standard Polynomial Multiplication Accelerator on RISC-V SoC for Post-Quantum Cryptography

open access: yesIEEE Access
Number Theoretic Transform (NTT) enables speeding up polynomial multiplications, thereby accelerating the implementation of lattice-based post-quantum cryptography (PQC) algorithms.
Duc-Thuan Dam   +5 more
doaj   +1 more source

Power Analytic Attacks on CRYSTALS-Kyber

open access: yes, 2023
Denne avhandlingen undersøker effekten av effektanalytiske sidekanalangrep på den kvantesikre nøkkelkapslingsalgoritmen CRYSTALS-Kyber. Vi gjenskapte og forbedret et tidligere korrelasjonsangrep utført av Karlov et al. Vi implementerte Kyber512 i ChipWhisperer-systemet og utførte angrepet tre ganger, med effektmålinger fra 1000, 200 og 50 ...
openaire   +1 more source

Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series

open access: yesIEEE Access
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim   +2 more
doaj   +1 more source

NSEA: A Resilient ERP Framework Integrating Quantum-Safe Cryptography and Neuro-Symbolic Reasoning for Industrial Adaptability

open access: yesIEEE Access
This study proposes a neurosymbolic ERP architecture (NSEA) incorporating post-quantum cryptographic protocols to enable real-time cybersecurity and adaptive operational optimization. NSEA integrates CRYSTALS-Kyber lattice-based post-quantum cryptography
Yong Lin, Yadi Lin
doaj   +1 more source

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +1 more source

Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation

open access: yesCryptography
CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024.
Costin Ghiban, Marios Omar Choudary
doaj   +1 more source

MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
CRYSTALS-Kyber, one of the NIST PQC standardization schemes, has garnered considerable attention from researchers in recent years for its side-channel security.
Fan Huang   +4 more
doaj   +1 more source

Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

open access: yesComputers
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy