Results 161 to 170 of about 6,039 (185)
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N +9 more
europepmc +1 more source
A novel framework for secure cryptocurrency transactions using quantum crypto guard. [PDF]
Alsayaydeh JAJ +4 more
europepmc +1 more source
Injectable contraceptive continuation and user experiences in Punjab, Pakistan: a non-randomized prospective cohort study protocol. [PDF]
Tappis H +9 more
europepmc +1 more source
Kyber- ja hybridiuhat haastavat merenkulun – olemmeko valmiita?
Satopää Pia +2 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
An Efficient Implementation of KYBER
IEEE Transactions on Circuits and Systems II: Express Briefs, 2022Quantum algorithms pose a huge threat to the current cryptosystems. In this article, we present a hardware implementation of CRYSTALS-KYBER which is one of the post-quantum cryptosystems based on the Module-LWE problem. Using the proposed modular reduction algorithm, modified modular adder and the reconfigurable data path, the design shares the ...
Wenbo Guo, Shuguo Li, Liang Kong
openaire +1 more source
Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors
2021Public-key cryptography based on the lattice problem is efficient and believed to be secure in a post-quantum era. In this paper, we introduce carefully-optimized implementations of Kyber encryption schemes for 64-bit ARM Cortex-A processors. Our research contribution includes optimizations for Number Theoretic Transform (NTT), noise sampling, and AES ...
Pakize Sanal +4 more
openaire +1 more source
Instruction-Set Accelerated Implementation of CRYSTALS-Kyber
IEEE Transactions on Circuits and Systems I: Regular Papers, 2021Large scale quantum computers will break classical public-key cryptography protocols by quantum algorithms such as Shor’s algorithm. Hence, designing quantum-safe cryptosystems to replace current classical algorithms is crucial. Luckily there are some post-quantum candidates that are assumed to be resistant against future attacks from quantum computers,
Mojtaba Bisheh-Niasar +2 more
openaire +1 more source
2023
The expected arrival of powerful quantum computers within the near future represents a great challenge to our modern-day cryptography. Symmetric key encryption is not considered to be vulnerable against attacks by quantum computers if the key size is doubled. Asymmetric cryptography, however, is shown to be susceptible to quantum attacks. In this paper
Lawo, Daniel +4 more
openaire +1 more source
The expected arrival of powerful quantum computers within the near future represents a great challenge to our modern-day cryptography. Symmetric key encryption is not considered to be vulnerable against attacks by quantum computers if the key size is doubled. Asymmetric cryptography, however, is shown to be susceptible to quantum attacks. In this paper
Lawo, Daniel +4 more
openaire +1 more source
Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within a Bio-KEM Framework
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023Junwei Yu +4 more
openaire +1 more source
Kyber, Manfred: Tiergeschichten
The German Quarterly, 1932Frances E. Myer, E. P. Kremer
openaire +1 more source

