Results 71 to 80 of about 1,573 (212)
Methodology and Architecture for Benchmarking End-to-End PQC Protocol Resilience in an IoT Context
Migrating to Post-Quantum Cryptography (PQC) is critical for securing resource-constrained Internet of Things (IoT) devices against the “harvest-now, decrypt-later” threat.
Mohammed G. Almutairi +1 more
doaj +1 more source
The rapid progress of quantum computing threatens the long-term security of classical public-key cryptosystems, thereby necessitating an urgent transition toward post-quantum cryptography (PQC).
Donagani Ramakrishna, Mohammed Ali Shaik
doaj +1 more source
Resilience of Post-Quantum Cryptography in Lightweight IoT Protocols: A Systematic Review
The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud communications ...
Mohammed Almutairi, Frederick T. Sheldon
doaj +1 more source
Single-Trace Attacks on Message Encoding in Lattice-Based KEMs
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim +8 more
doaj +1 more source
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard.
Zewen Ye +5 more
doaj +1 more source
Implementation and integration of NTT/INTT accelerator on RISC-V for CRYSTALS-Kyber [PDF]
This paper presents a comprehensive study on the implementation of a RISC-V-based memory-mapped accelerator designed for Number Theoretic Transform (NTT) and Inverse Number Theoretic Transform (INTT) operations within the context of the post-quantum ...
Dolmeta, Alessandra +3 more
core +1 more source
Quantum-resistant Transport Layer Security [PDF]
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain +6 more
core +3 more sources
This survey is on forward-looking, emerging security concerns in post-quantum era, i.e., the implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) competition and thus the visions, insights, and discussions can be used as a step
Azarderakhsh, Reza +3 more
core
Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI).
Qaiser Khan +2 more
doaj +1 more source
Quantum-Safe Public Key Infrastructure (PKI): Evaluating Cache Side-Channel Threats Against CRYSTALS-Kyber [PDF]
For decades, traditional Public Key Infrastructure has relied on Rivest-Shamir-Adleman (RSA) and Elliptic curve cryptography (ECC) to secure digital communications, including medical records, banking transactions, government communications, and critical ...
Shinn, Stephanie
core +1 more source

