FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber
In lattice-based post-quantum cryptography, polynomial multiplication is complicated and time-consuming.In order to improve the computational efficiency of lattice cryptography in practical applications, an FPGA multi-unit parallel optimization and ...
Bin LI +3 more
doaj
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM.
Daniel J. Bernstein +9 more
doaj +1 more source
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with errors (LWE) problem, have been subjected to several physical attacks in the recent past.
Suparna Kundu +5 more
doaj +1 more source
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah +3 more
doaj +1 more source
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard.
Zewen Ye +5 more
doaj +1 more source
Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network. [PDF]
Wang M, Zhang W, Guo J, Song X, Long G.
europepmc +1 more source
Revisiting Keccak and Dilithium Implementations on ARMv7-M
Keccak is widely used in lattice-based cryptography (LBC) and its impact to the overall running time in LBC scheme can be predominant on platforms lacking dedicated SHA-3 instructions. This holds true on embedded devices for Kyber and Dilithium, two LBC
Junhao Huang +7 more
doaj +1 more source
Post-Quantum Security: Opportunities and Challenges. [PDF]
Li S +7 more
europepmc +1 more source
A lightweight hardware implementation of CRYSTALS-Kyber
The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future. Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post-quantum cryptographic (PQC) algorithms worldwide.
Shiyang He, Hui Li, Fenghua Li, Ruhui Ma
openaire +2 more sources
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu +4 more
doaj +1 more source

