Results 101 to 110 of about 6,104 (190)

Targeting the Vulnerable and the Choice of Vulnerability Measures: Review and Application to Pakistan [PDF]

open access: yes
In this paper, the concept of vulnerability of the poor’s welfare and its practical measures are scrutinised in order to derive implications for targeting poverty reduction policies toward vulnerable households.
Takashi Kurosaki
core  

CRYPHTOR: A Memory-Unified NTT-Based Hardware Accelerator for Post-Quantum CRYSTALS Algorithms

open access: yesIEEE Access
This paper presents the design and FPGA implementation of a hardware accelerator for the Post-Quantum CRYSTALS-Kyber and CRYSTALS-Dilithium algorithms, named CRYPHTOR (CRYstals Polynomial HW acceleraTOR).
Stefano Di Matteo   +2 more
doaj   +1 more source

Multicore Implementation of Kyber on RP2350A for Resource Constrained Environments

open access: yesIEEE Access
Quantum computers pose a serious threat to conventional public-key cryptography, motivating the adoption of post-quantum schemes such as Kyber. Resource-constrained devices, however, face challenges in sustaining the added computational cost.
Achintya Nigam   +3 more
doaj   +1 more source

Highly Reliable and Secure System With Multi-Layer Parallel LDPC and Kyber for 5G Communications

open access: yesIEEE Access
The development of fifth-generation (5G) technology marks a significant milestone for digital communication systems, providing substantial improvements in data transmission speeds and enabling enhanced connectivity across a wider range of devices ...
Linh Nguyen   +2 more
doaj   +1 more source

KyberSlash: Exploiting secret-dependent division timings in Kyber implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM.
Daniel J. Bernstein   +9 more
doaj   +1 more source

Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with errors (LWE) problem, have been subjected to several physical attacks in the recent past.
Suparna Kundu   +5 more
doaj   +1 more source

Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT

open access: yesIEEE Open Journal of the Communications Society
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah   +3 more
doaj   +1 more source

A lightweight hardware implementation of CRYSTALS-Kyber

open access: yesJournal of Information and Intelligence
The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future. Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post-quantum cryptographic (PQC) algorithms worldwide.
Shiyang He, Hui Li, Fenghua Li, Ruhui Ma
openaire   +2 more sources

A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard.
Zewen Ye   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy