Results 1 to 10 of about 186,193 (271)

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]

open access: yesSensors, 2023
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq   +6 more
doaj   +2 more sources

Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials [PDF]

open access: goldIEEE Access, 2020
In the field of post-quantum cryptography, lattice-based cryptography has received the most noticeable attention. Most lattice-based cryptographic schemes are constructed based on the polynomial ring Rq = Zq[x]/f (x), using a cyclotomic polynomial f (x).
So Hyun Park   +3 more
doaj   +2 more sources

Modelling and verification of post-quantum key encapsulation mechanisms using Maude [PDF]

open access: yesPeerJ Computer Science, 2023
Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available ...
Víctor García   +4 more
doaj   +3 more sources

Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [PDF]

open access: yesPeerJ Computer Science, 2023
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method.
Kübra Seyhan, Sedat Akleylek
doaj   +3 more sources

Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model [PDF]

open access: goldIEEE Access, 2021
Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms.
Shengfeng Xu, Xiangxue Li
doaj   +2 more sources

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism [PDF]

open access: greenTransactions on Cryptographic Hardware and Embedded Systems
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu   +4 more
doaj   +2 more sources

Post-Quantum Wireless-Based Key Encapsulation Mechanism via CRYSTALS-Kyber for Resource-Constrained Devices

open access: goldIEEE Access
We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems.
M. A. Gonzalez de la Torre   +3 more
doaj   +2 more sources

Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm [PDF]

open access: goldEURASIP Journal on Information Security
A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko, and Barbeau.
Randy Kuang   +3 more
doaj   +2 more sources

Fault Attacks on CCA-secure Lattice KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process ...
Peter Pessl, Lukas Prokop
doaj   +1 more source

Home - About - Disclaimer - Privacy