Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq +6 more
doaj +2 more sources
Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials [PDF]
In the field of post-quantum cryptography, lattice-based cryptography has received the most noticeable attention. Most lattice-based cryptographic schemes are constructed based on the polynomial ring Rq = Zq[x]/f (x), using a cyclotomic polynomial f (x).
So Hyun Park +3 more
doaj +2 more sources
Modelling and verification of post-quantum key encapsulation mechanisms using Maude [PDF]
Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available ...
Víctor García +4 more
doaj +3 more sources
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [PDF]
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method.
Kübra Seyhan, Sedat Akleylek
doaj +3 more sources
Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model [PDF]
Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms.
Shengfeng Xu, Xiangxue Li
doaj +2 more sources
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism [PDF]
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu +4 more
doaj +2 more sources
We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems.
M. A. Gonzalez de la Torre +3 more
doaj +2 more sources
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm [PDF]
A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko, and Barbeau.
Randy Kuang +3 more
doaj +2 more sources
From Key Encapsulation to Authenticated Group Key Establishment—A Compiler for Post-Quantum Primitives † [PDF]
Persichetti E +2 more
europepmc +3 more sources
Fault Attacks on CCA-secure Lattice KEMs
NIST’s post-quantum standardization effort very recently entered its final round. This makes studying the implementation-security aspect of the remaining candidates an increasingly important task, as such analyses can aid in the final selection process ...
Peter Pessl, Lukas Prokop
doaj +1 more source

