Results 1 to 10 of about 6,039 (185)

Formally verifying Kyber

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any post-quantum cryptosystem.
José Bacelar Almeida   +11 more
doaj   +6 more sources

Pipelined and conflict-free number theoretic transform accelerator for CRYSTALS-Kyber on FPGA. [PDF]

open access: yesPLoS ONE
Post-quantum cryptographic (PQC) algorithms are essential due to the threat posed by quantum computers to the security of currently deployed cryptosystems.
Ayesha Waris   +2 more
doaj   +2 more sources

A Lightweight Key Agreement Protocol for V2X Communications Based on Kyber and Saber [PDF]

open access: yesSensors
This paper proposes a post-quantum secure key agreement protocol tailored for vehicular networks (V2X), addressing the dual challenges of quantum resistance and lightweight deployment.
Yinfei Dai   +3 more
doaj   +2 more sources

Area-time efficient pipelined number theoretic transform for CRYSTALS-Kyber. [PDF]

open access: yesPLoS ONE
CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. The bottleneck in performance of Kyber is the polynomial multiplication
Ayesha Waris   +2 more
doaj   +2 more sources

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

open access: yesApplied Sciences, 2022
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen   +3 more
doaj   +1 more source

A RISC-V Post Quantum Cryptography Instruction Set Extension for Number Theoretic Transform to Speed-Up CRYSTALS Algorithms

open access: yesIEEE Access, 2021
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
Pietro Nannipieri   +5 more
doaj   +1 more source

Improved Plantard Arithmetic for Lattice-based Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper presents an improved Plantard’s modular arithmetic (Plantard arithmetic) tailored for Lattice-Based Cryptography (LBC). Based on the improved Plantard arithmetic, we present faster implementations of two LBC schemes, Kyber and NTTRU, running ...
Junhao Huang   +6 more
doaj   +3 more sources

Lattice-Based Cryptography in the Quantum Era: A Survey

open access: yesInterfases, 2023
The advent of quantum computing reveals current classical cryptography’s incapacity to withstand attacks within the new paradigm. Quantum algorithms break such encryption with impressive ease, with Shor and Grover algorithms being the main perpetrators ...
Mauricio Cisneros, Javier Olazabal
doaj   +1 more source

The Feasibility of the CRYSTALS-Kyber Scheme for Smart Metering Systems

open access: yesIEEE Access, 2022
This paper investigates the feasibility of a quantum-secure Key Encapsulation Mechanism (KEM) in hardware constrained Smart Meter (SM) equipment. In this sense, the Cryptographic Suite for Algebraic Lattices (CRYSTALS)-Kyber scheme, the new standard for ...
Vinicius L. R. Da Costa   +3 more
doaj   +1 more source

Morality at play: pretend play in five-year-old children [PDF]

open access: yes, 2018
The concept of 'play' is notoriously ambiguous, but we do know that when children engage in make-believe play the activity provides benefits for psychological development, holistic health, and building knowledge and relationships.
Bateman, Amanda, Roberts, Peri
core   +2 more sources

Home - About - Disclaimer - Privacy