Results 161 to 170 of about 6,039 (185)

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Aquina N   +9 more
europepmc   +1 more source

A novel framework for secure cryptocurrency transactions using quantum crypto guard. [PDF]

open access: yesPeerJ Comput Sci
Alsayaydeh JAJ   +4 more
europepmc   +1 more source

Injectable contraceptive continuation and user experiences in Punjab, Pakistan: a non-randomized prospective cohort study protocol. [PDF]

open access: yesBMC Womens Health
Tappis H   +9 more
europepmc   +1 more source

An Efficient Implementation of KYBER

IEEE Transactions on Circuits and Systems II: Express Briefs, 2022
Quantum algorithms pose a huge threat to the current cryptosystems. In this article, we present a hardware implementation of CRYSTALS-KYBER which is one of the post-quantum cryptosystems based on the Module-LWE problem. Using the proposed modular reduction algorithm, modified modular adder and the reconfigurable data path, the design shares the ...
Wenbo Guo, Shuguo Li, Liang Kong
openaire   +1 more source

Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors

2021
Public-key cryptography based on the lattice problem is efficient and believed to be secure in a post-quantum era. In this paper, we introduce carefully-optimized implementations of Kyber encryption schemes for 64-bit ARM Cortex-A processors. Our research contribution includes optimizations for Number Theoretic Transform (NTT), noise sampling, and AES ...
Pakize Sanal   +4 more
openaire   +1 more source

Instruction-Set Accelerated Implementation of CRYSTALS-Kyber

IEEE Transactions on Circuits and Systems I: Regular Papers, 2021
Large scale quantum computers will break classical public-key cryptography protocols by quantum algorithms such as Shor’s algorithm. Hence, designing quantum-safe cryptosystems to replace current classical algorithms is crucial. Luckily there are some post-quantum candidates that are assumed to be resistant against future attacks from quantum computers,
Mojtaba Bisheh-Niasar   +2 more
openaire   +1 more source

Implementation and Comparison of Dilithium/Kyber and Falcon/Kyber PQC software stack on data processing units

2023
The expected arrival of powerful quantum computers within the near future represents a great challenge to our modern-day cryptography. Symmetric key encryption is not considered to be vulnerable against attacks by quantum computers if the key size is doubled. Asymmetric cryptography, however, is shown to be susceptible to quantum attacks. In this paper
Lawo, Daniel   +4 more
openaire   +1 more source

Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within a Bio-KEM Framework

2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023
Junwei Yu   +4 more
openaire   +1 more source

Kyber, Manfred: Tiergeschichten

The German Quarterly, 1932
Frances E. Myer, E. P. Kremer
openaire   +1 more source

Home - About - Disclaimer - Privacy