RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices [PDF]
We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems.
Joohee Lee +4 more
doaj +2 more sources
Modelling and verification of post-quantum key encapsulation mechanisms using Maude [PDF]
Communication and information technologies shape the world’s systems of today, and those systems shape our society. The security of those systems relies on mathematical problems that are hard to solve for classical computers, that is, the available current computers.
Víctor M. García +4 more
openalex +6 more sources
Cca-Secure Key Encapsulation Mechanism Based on Factoring Assumption [PDF]
ABSTRACT In this article a key encapsulation mechanism is presented which is based on squaring function, where the input element is from QR+N, where QR+N denotes the signed quadratic residue group, and N is a Blum integer.
Gyöngyvér Márton
openalex +3 more sources
Module-Lattice-Based Key-Encapsulation Mechanism Standard
A key-encapsulation mechanism (or KEM) is a set of algorithms that, under certain conditions, can be used by two parties to establish a shared secret key over a public channel. A shared secret key that is securely established using a KEM can then be used with symmetric-key cryptographic algorithms to perform basic tasks in secure communications, such ...
National Institute of Standards and Technology
openalex +2 more sources
A Key Encapsulation Mechanism from Low Density Lattice Codes [PDF]
Key Encapsulation Mechanisms (KEMs) are a set of cryptographic techniques that are designed to provide symmetric encryption key using asymmetric mechanism (public key). In the current study, we concentrate on design and analysis of key encapsulation mechanism from low density lattice codes (KEM-LDLC) to go down the key size by keeping an acceptable ...
Reza Hooshmand
openalex +3 more sources
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer
Physical attacks are serious threats to cryptosystems deployed in the real world. In this work, we propose a microarchitectural end-to-end attack methodology on generic lattice-based post-quantum key encapsulation mechanisms to recover the long-term secret key.
Puja Mondal +4 more
openalex +5 more sources
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu +4 more
doaj +3 more sources
Compact and Simple RLWE Based Key Encapsulation Mechanism
In this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quantum standardization project candidates. Our scheme is based on NewHope, thus it is simple and has fast implementation while it is making use of smaller key sizes and easily changeable security level advantages of Kyber .
Erdem Alkım +2 more
openalex +5 more sources
Comparison of security arguments of promising key encapsulation mechanisms
Исследование механизмов инкапсуляции ключей на алгебраических решетках является одним из важных направлений в современной постквантовой криптографии, поскольку многие механизмы уже либо стандартизированы (ANSI X.9.98, ДСТУ 8961:2019 “Скеля” ), либо являются перспективными кандидатами на стандартизацию (CRYSTALS-Kyber, FrodoKEM).
Yu.I. Gorbenko, Serhii Kandii
+6 more sources
On Constructing Dynamic and Forward Secure Authenticated Group Key Agreement Scheme from Multikey Encapsulation Mechanism [PDF]
The approach of instantiating authenticated group key exchange (GAKE) protocol from the multikey encapsulation mechanism (mKEM) has an important advantage of achieving classical requirement of GAKE security in one communication round.
Iraj Fathirad, John Devlin
doaj +2 more sources

