Results 81 to 90 of about 371 (175)

Hardware Acceleration for High-Volume Operations of CRYSTALS-Kyber and CRYSTALS-Dilithium

open access: yesACM Transactions on Reconfigurable Technology and Systems
Many high-demand digital services need to perform several cryptographic operations, such as key exchange or security credentialing, in a concise amount of time. In turn, the security of some of these cryptographic schemes is threatened by advances in quantum computing, as quantum computer could break their security in the near future. Post-
Xavier Carril   +7 more
openaire   +3 more sources

Bitstream Fault Injection Attacks on CRYSTALS Kyber Implementations on FPGAs

open access: yes2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)
CRYSTALS-Kyber is the only Public-key Encryption (PKE)/ Key-encapsulation Mechanism (KEM) scheme that was chosen for standardization by the National Institute of Standards and Technology initiated Post-quantum Cryptography competition (so called NIST PQC). In this paper, we show the first successfully malicious modifications of the bitstream of a Kyber
Ni, Ziying   +3 more
openaire   +2 more sources

Post-Quantum Key Exchange in TLS 1.3: Further Analysis on Performance of New Cryptographic Standards

open access: yesCryptography
The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS).
Konstantina Souvatzidaki   +1 more
doaj   +1 more source

Дослідження вразливостей алгоритму RSA через атаки на факторизацію, реалізовані за допомогою квантових обчислень

open access: yesSocial Development & Security
Мета роботи: дослідити ризики для безпеки інформації, які створюють квантові атаки, зокрема з використанням алгоритму Шора для факторизації великих чисел за допомогою бібліотеки Qiskit.
Roman Shkliarskyy, Danyil Zhuravchak
doaj   +1 more source

Quantum-Resistant Blockchain Protocols for Secure Transactions

open access: yesIEEE Access
The advent of quantum computing threatens the cryptographic security of traditional blockchain systems, potentially rendering current encryption techniques obsolete.
Vishal Puneyani, K. Vivekananda Bhat
doaj   +1 more source

Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization

open access: yesIEEE Design & Test
CRYSTALS-Kyber has been selected by the NIST as a post-quantum public-key encryption and key establishment algorithm to be standardized. This makes it important to develop side-channel attack resistant implementations of CRYSTALS-Kyber. In this paper, we propose utilizing duplication combined with clock randomization as a means of protecting CRYSTALS ...
Michail Moraitis   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy