Results 11 to 20 of about 6,099,057 (328)

Standard Lattice-Based Key Encapsulation on Embedded Devices [PDF]

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al.
James Howe   +3 more
doaj   +6 more sources

Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this paper, we introduce Scabbard, a suite of post-quantum keyencapsulation mechanisms. Our suite contains three different schemes Florete, Espada, and Sable based on the hardness of module- or ring-learning with rounding problem.
Jose Maria Bermudo Mera   +3 more
doaj   +5 more sources

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2022
The evolution of quantum computers poses a serious threat to contemporary public-key encryption (PKE) schemes. To address this impending issue, the National Institute of Standards and Technology (NIST) is currently undertaking the Post-Quantum ...
M. Nosouhi   +6 more
semanticscholar   +3 more sources

From Key Encapsulation to Authenticated Group Key Establishment—A Compiler for Post-Quantum Primitives † [PDF]

open access: goldEntropy (Basel), 2019
Assuming the availability of an existentially unforgeable signature scheme and an (IND- CCA secure) key encapsulation mechanism, we present a generic construction for group key establishment. The construction is designed with existing proposals for post-quantum cryptography in mind.
Persichetti E   +2 more
europepmc   +5 more sources

Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange

open access: bronzeIACR Cryptology ePrint Archive, 2019
Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transition applications from classical to quantum-resistant solutions.
Nina Bindel   +4 more
semanticscholar   +4 more sources

Key encapsulation mechanism based on polar codes

open access: yesIET Communications, 2022
This paper introduces a key encapsulation mechanism based on polar codes, called as KEM‐PC, with secure and efficient key generation, encapsulation and decapsulation algorithms.
Reza Hooshmand, Mahdi Khoshfekr
doaj   +2 more sources

DAGS: Key encapsulation using dyadic GS codes [PDF]

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +7 more sources

Efficient identity-based key encapsulation to multiple parties [PDF]

open access: yes, 2005
We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties.
Barbosa, Manuel, Farshim, P.
core   +5 more sources

RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices [PDF]

open access: goldIEEE Access, 2019
We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems.
Joohee Lee   +4 more
doaj   +2 more sources

Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements

open access: goldSci
Key exchange mechanisms are foundational to secure communication, yet traditional methods face challenges from quantum computing. The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a post-quantum cryptographic key exchange protocol with ...
Naya Nagy   +7 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy