Hardware Acceleration for High-Volume Operations of CRYSTALS-Kyber and CRYSTALS-Dilithium
Many high-demand digital services need to perform several cryptographic operations, such as key exchange or security credentialing, in a concise amount of time. In turn, the security of some of these cryptographic schemes is threatened by advances in quantum computing, as quantum computer could break their security in the near future. Post-
Xavier Carril +7 more
openaire +3 more sources
Bitstream Fault Injection Attacks on CRYSTALS Kyber Implementations on FPGAs
CRYSTALS-Kyber is the only Public-key Encryption (PKE)/ Key-encapsulation Mechanism (KEM) scheme that was chosen for standardization by the National Institute of Standards and Technology initiated Post-quantum Cryptography competition (so called NIST PQC). In this paper, we show the first successfully malicious modifications of the bitstream of a Kyber
Ni, Ziying +3 more
openaire +2 more sources
Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste [PDF]
Elena Dubrova +3 more
openalex +1 more source
Post-Quantum Key Exchange in TLS 1.3: Further Analysis on Performance of New Cryptographic Standards
The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS).
Konstantina Souvatzidaki +1 more
doaj +1 more source
Мета роботи: дослідити ризики для безпеки інформації, які створюють квантові атаки, зокрема з використанням алгоритму Шора для факторизації великих чисел за допомогою бібліотеки Qiskit.
Roman Shkliarskyy, Danyil Zhuravchak
doaj +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Quantum-Resistant Blockchain Protocols for Secure Transactions
The advent of quantum computing threatens the cryptographic security of traditional blockchain systems, potentially rendering current encryption techniques obsolete.
Vishal Puneyani, K. Vivekananda Bhat
doaj +1 more source
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. [PDF]
Xu S +5 more
europepmc +1 more source
Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC [PDF]
Nicolas Rodriguez-Alvarez +1 more
openalex +1 more source
Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization
CRYSTALS-Kyber has been selected by the NIST as a post-quantum public-key encryption and key establishment algorithm to be standardized. This makes it important to develop side-channel attack resistant implementations of CRYSTALS-Kyber. In this paper, we propose utilizing duplication combined with clock randomization as a means of protecting CRYSTALS ...
Michail Moraitis +5 more
openaire +2 more sources

