Results 101 to 110 of about 6,039 (185)

FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber

open access: yesTongxin xuebao, 2022
In lattice-based post-quantum cryptography, polynomial multiplication is complicated and time-consuming.In order to improve the computational efficiency of lattice cryptography in practical applications, an FPGA multi-unit parallel optimization and ...
Bin LI   +3 more
doaj  

KyberSlash: Exploiting secret-dependent division timings in Kyber implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM.
Daniel J. Bernstein   +9 more
doaj   +1 more source

Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with errors (LWE) problem, have been subjected to several physical attacks in the recent past.
Suparna Kundu   +5 more
doaj   +1 more source

Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT

open access: yesIEEE Open Journal of the Communications Society
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah   +3 more
doaj   +1 more source

A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard.
Zewen Ye   +5 more
doaj   +1 more source

Revisiting Keccak and Dilithium Implementations on ARMv7-M

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Keccak is widely used in lattice-based cryptography (LBC) and its impact to the overall running time in LBC scheme can be predominant on platforms lacking dedicated SHA-3 instructions. This holds true on embedded devices for Kyber and Dilithium, two LBC
Junhao Huang   +7 more
doaj   +1 more source

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

A lightweight hardware implementation of CRYSTALS-Kyber

open access: yesJournal of Information and Intelligence
The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future. Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post-quantum cryptographic (PQC) algorithms worldwide.
Shiyang He, Hui Li, Fenghua Li, Ruhui Ma
openaire   +2 more sources

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy