Results 71 to 80 of about 1,573 (212)

Methodology and Architecture for Benchmarking End-to-End PQC Protocol Resilience in an IoT Context

open access: yesIoT
Migrating to Post-Quantum Cryptography (PQC) is critical for securing resource-constrained Internet of Things (IoT) devices against the “harvest-now, decrypt-later” threat.
Mohammed G. Almutairi   +1 more
doaj   +1 more source

PSESV: A hybrid post-quantum encryption Framework with real-time thermal and EM side-channel attack detection

open access: yesAin Shams Engineering Journal
The rapid progress of quantum computing threatens the long-term security of classical public-key cryptosystems, thereby necessitating an urgent transition toward post-quantum cryptography (PQC).
Donagani Ramakrishna, Mohammed Ali Shaik
doaj   +1 more source

Resilience of Post-Quantum Cryptography in Lightweight IoT Protocols: A Systematic Review

open access: yesEng
The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud communications ...
Mohammed Almutairi, Frederick T. Sheldon
doaj   +1 more source

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs

open access: yesIEEE Access, 2020
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim   +8 more
doaj   +1 more source

A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard.
Zewen Ye   +5 more
doaj   +1 more source

Implementation and integration of NTT/INTT accelerator on RISC-V for CRYSTALS-Kyber [PDF]

open access: yes
This paper presents a comprehensive study on the implementation of a RISC-V-based memory-mapped accelerator designed for Number Theoretic Transform (NTT) and Inverse Number Theoretic Transform (INTT) operations within the context of the post-quantum ...
Dolmeta, Alessandra   +3 more
core   +1 more source

Quantum-resistant Transport Layer Security [PDF]

open access: yes
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain   +6 more
core   +3 more sources

Algorithmic Security is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security

open access: yes, 2023
This survey is on forward-looking, emerging security concerns in post-quantum era, i.e., the implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) competition and thus the visions, insights, and discussions can be used as a step
Azarderakhsh, Reza   +3 more
core  

Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)

open access: yesInformation
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI).
Qaiser Khan   +2 more
doaj   +1 more source

Quantum-Safe Public Key Infrastructure (PKI): Evaluating Cache Side-Channel Threats Against CRYSTALS-Kyber [PDF]

open access: yes
For decades, traditional Public Key Infrastructure has relied on Rivest-Shamir-Adleman (RSA) and Elliptic curve cryptography (ECC) to secure digital communications, including medical records, banking transactions, government communications, and critical ...
Shinn, Stephanie
core   +1 more source

Home - About - Disclaimer - Privacy