Results 111 to 120 of about 6,104 (190)

Revisiting Keccak and Dilithium Implementations on ARMv7-M

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Keccak is widely used in lattice-based cryptography (LBC) and its impact to the overall running time in LBC scheme can be predominant on platforms lacking dedicated SHA-3 instructions. This holds true on embedded devices for Kyber and Dilithium, two LBC
Junhao Huang   +7 more
doaj   +1 more source

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu   +4 more
doaj   +1 more source

Sadberk Hanım Müzesi:Karia Koleksiyonu [PDF]

open access: yes
Taha Toros Arşivi, Dosya No: 114-Müzelerİstanbul Kalkınma Ajansı (TR10/14/YEN/0033) İstanbul Development Agency (TR10/14/YEN ...
Anlağan, Tanju
core  

Adaptive Template Attacks on the Kyber Binomial Sampler

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems
Template attacks build a Gaussian multivariate model of the side-channel leakage signal generated by each value of a targeted intermediate variable. Combined with additional steps, such as dimensionality reduction, such models can help to infer a value with nearly 100% accuracy from just a single attack trace. We demonstrate this here by reconstructing
Peng, Eric Chun-Yu, Kuhn, Markus G
openaire   +2 more sources

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

Vältä kyber-kömmähdys

open access: yesTehy, 2020
Mäkelä, Jaana   +4 more
openaire   +3 more sources

Modelling and verification of post-quantum key encapsulation mechanisms using Maude. [PDF]

open access: yesPeerJ Comput Sci, 2023
García V   +4 more
europepmc   +1 more source

Power Analytic Attacks on CRYSTALS-Kyber

open access: yes, 2023
Denne avhandlingen undersøker effekten av effektanalytiske sidekanalangrep på den kvantesikre nøkkelkapslingsalgoritmen CRYSTALS-Kyber. Vi gjenskapte og forbedret et tidligere korrelasjonsangrep utført av Karlov et al. Vi implementerte Kyber512 i ChipWhisperer-systemet og utførte angrepet tre ganger, med effektmålinger fra 1000, 200 og 50 ...
openaire   +1 more source

Home - About - Disclaimer - Privacy