Results 171 to 180 of about 6,039 (185)
Some of the next articles are maybe not open access.
Quantum pairwise-parallel mismatch attack on Kyber
Physica ScriptaAbstract Quantum algorithm uses the quantum parallel method to calculate, which can better solve the encryption and decryption problems in cryptography and secure communication. This paper proposeS a quantum pairwise-parallel mismatch attack on Kyber using the quantum binary search method. We first give quantum search methods for finding
Yaru Wang, Jianmei Liu
openaire +1 more source
Chosen ciphertext correlation power analysis on Kyber
Integration, 2023Yipei Yang +7 more
openaire +1 more source
Low latency FPGA implementation of NTT for Kyber
Microprocessors and Microsystems, 2023Mohamed Saoudi +4 more
openaire +1 more source
Efficient Implementation of Kyber on Mobile Devices
2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), 2021Lirui Zhao +4 more
openaire +1 more source
An Improved Key Mismatch Attack on Kyber
2023 7th International Conference on Cryptography, Security and Privacy (CSP), 2023Yaru Wang, Haodong Jiang, Zhi Ma
openaire +1 more source
CRYSTALS - Kyber: Análisis e implementación
La llegada de los ordenadores cuánticos amenaza la seguridad de las comunicaciones, debido a que estas, por el momento, están protegidas por criptografía de clave pública (asimétrica). La fortaleza de estos algoritmos criptográficos está basada en problemas computacionalmente complejos de resolver.openaire +1 more source
HI-Kyber: A Novel High-Performance Implementation Scheme of Kyber Based on GPU
IEEE Transactions on Parallel and Distributed SystemsXinyi Ji +5 more
openaire +1 more source
La Transformada Teórica de Números para Kyber
La Transformada Teórica de Números es un método eficiente para la multiplicación de dos polinomios de grado alto, ampliamente usado para sistemas criptográficos basados en retículos como Kyber y Dilithium. Este documento se centra en el caso concreto de Kyber.Antuñano Cabrera, Néstor +6 more
openaire +1 more source
P 2 SE-Kyber: A PUF-based Physical Security Enhanced Approach for Kyber
2025 4th International Conference on Electronic Information Technology (EIT)Junwei Li +3 more
openaire +1 more source

