Results 81 to 90 of about 1,573 (212)

Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework [PDF]

open access: yes
This study develops a conceptual framework to enhance the security and functionality of Electronic Health Records (EHRs) in response to advancing healthcare needs.
Benaich, Rihab   +2 more
core   +1 more source

Deep Learning Enhanced Side Channel Analysis on CRYSTALS-Kyber

open access: yes2024 25th International Symposium on Quality Electronic Design (ISQED)
The combination of Deep-learning (DL) and Sidechannel analysis (SCA) has been proven by several attacks targeting symmetric key cryptography implementations such as AES. This paper aims to demonstrate the effectiveness of DL in attacking a Post Quantum CRYSTALS-Kyber implementation to recover the private key.
Hoang, Anh-Tuan   +6 more
openaire   +4 more sources

Implementation of CRYSTALS-Kyber with a physical unclonable function on ESP32 microcontrollers [PDF]

open access: yes
Tato práce se soustředí na efektivní implementaci post-kvantového kryptografického algoritmu CRYSTALS-Kyber na rodině mikrokontrolérů ESP32 kde zdrojem entropie je fyzicky neklonovatelná funkce s cílem generování páru klíčů závislých na daném ...
Egon Procházka
core  

Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and Their Use in Quantum-Resistant TLS Protocols

open access: yesIEEE Access
Cryptographic protocols can be used to covertly exchange information without arousing suspicion. The covert channels created in this way are called subliminal channels. In this work, three different subliminal channels using CRYSTALS-Kyber are discovered.
Roberto Roman   +2 more
doaj   +1 more source

Benchmarking and Integration of NIST Post-Quantum Cryptography on Android Devices [PDF]

open access: yesEPJ Web of Conferences
In recent years, there has been spontaneous development in practical quantum computing. This poses a serious risk to today’s cryptographic infrastructure, especially on mobile platforms.
Chatterjee Snehil   +7 more
doaj   +1 more source

Side-channel analysis of the CRYSTALS-Kyber post-quantum algorithm [PDF]

open access: yes, 2023
S přichodem doby kvantových počitačů se zvyšuje poptávka po nových bezpečných šifrách. Kyber, mechanismus pro zapouzdřeni kliče, je jednim z adeptů na standard šifry pro postkvantovou dobu. Tato práce studuje implementaci šifry Kyber a jeji odolnost vůči
Michal Franc
core  

High-Efficiency Multi-Standard Polynomial Multiplication Accelerator on RISC-V SoC for Post-Quantum Cryptography

open access: yesIEEE Access
Number Theoretic Transform (NTT) enables speeding up polynomial multiplications, thereby accelerating the implementation of lattice-based post-quantum cryptography (PQC) algorithms.
Duc-Thuan Dam   +5 more
doaj   +1 more source

Verification of Correctness and Security Properties for CRYSTALS-KYBER [PDF]

open access: yes, 2023
This paper describes a formalization of the specification and the algorithm of the public key encryption scheme CRYSTALS-KYBER as well as the verification of its $\delta$-correctness and indistinguishability under chosen plaintext attack (IND-CPA ...
Katharina Kreuzer
core  

Security and Fairness in Multi-Party Quantum Secret Sharing Protocol [PDF]

open access: yes
Quantum secret sharing (QSS) is a cryptographic protocol that leverages quantum mechanics to distribute a secret among multiple parties. With respect to the classical counterpart, in QSS the secret is encoded into quantum states and shared by a dealer ...
Cassioli D., Santo A. D., Tiberti W.
core   +1 more source

A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber [PDF]

open access: yes, 2023
Last year CRYSTALS-Kyber was chosen by NIST as a new, post-quantum secure key encapsulation mechanism to be standardized. This makes it important to assess the resistance of CRYSTALS-Kyber implementations to physical attacks. Pure side-channel attacks on
Elena Dubrova   +3 more
core  

Home - About - Disclaimer - Privacy