Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq +6 more
doaj +7 more sources
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [PDF]
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method.
Kübra Seyhan, Sedat Akleylek
doaj +4 more sources
Modelling and verification of post-quantum key encapsulation mechanisms using Maude [PDF]
Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available ...
Víctor García +4 more
doaj +4 more sources
Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model [PDF]
Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms.
Shengfeng Xu, Xiangxue Li
doaj +3 more sources
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes [PDF]
This work presents a new code-based key encapsulation mechanism (KEM) called LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density parity-check codes as secret codes, providing high decoding speeds and compact ...
Marco Baldi +4 more
semanticscholar +5 more sources
Bit Flipping Key Encapsulation for the Post-Quantum Era
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi +3 more
doaj +3 more sources
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism [PDF]
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu +4 more
doaj +6 more sources
A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer
Physical attacks are serious threats to cryptosystems deployed in the real world. In this work, we propose a microarchitectural end-to-end attack methodology on generic lattice-based post-quantum key encapsulation mechanisms to recover the long-term ...
Puja Mondal +4 more
semanticscholar +6 more sources
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature [PDF]
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue +3 more
doaj +2 more sources
Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials [PDF]
In the field of post-quantum cryptography, lattice-based cryptography has received the most noticeable attention. Most lattice-based cryptographic schemes are constructed based on the polynomial ring Rq = Zq[x]/f (x), using a cyclotomic polynomial f (x).
So Hyun Park +3 more
doaj +2 more sources

