Results 1 to 10 of about 6,099,057 (328)

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]

open access: goldSensors, 2023
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq   +6 more
doaj   +7 more sources

Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [PDF]

open access: goldPeerJ Computer Science, 2023
In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method.
Kübra Seyhan, Sedat Akleylek
doaj   +4 more sources

Modelling and verification of post-quantum key encapsulation mechanisms using Maude [PDF]

open access: yesPeerJ Computer Science, 2023
Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available ...
Víctor García   +4 more
doaj   +4 more sources

Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model [PDF]

open access: goldIEEE Access, 2021
Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms.
Shengfeng Xu, Xiangxue Li
doaj   +3 more sources

LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes [PDF]

open access: greenPost-Quantum Cryptography, 2018
This work presents a new code-based key encapsulation mechanism (KEM) called LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density parity-check codes as secret codes, providing high decoding speeds and compact ...
Marco Baldi   +4 more
semanticscholar   +5 more sources

Bit Flipping Key Encapsulation for the Post-Quantum Era

open access: yesIEEE Access, 2023
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi   +3 more
doaj   +3 more sources

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism [PDF]

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu   +4 more
doaj   +6 more sources

A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer

open access: greenIACR Cryptology ePrint Archive, 2023
Physical attacks are serious threats to cryptosystems deployed in the real world. In this work, we propose a microarchitectural end-to-end attack methodology on generic lattice-based post-quantum key encapsulation mechanisms to recover the long-term ...
Puja Mondal   +4 more
semanticscholar   +6 more sources

Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature [PDF]

open access: hybridIET Information Security, 2021
Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention.
Guanhao Xue   +3 more
doaj   +2 more sources

Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials [PDF]

open access: goldIEEE Access, 2020
In the field of post-quantum cryptography, lattice-based cryptography has received the most noticeable attention. Most lattice-based cryptographic schemes are constructed based on the polynomial ring Rq = Zq[x]/f (x), using a cyclotomic polynomial f (x).
So Hyun Park   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy