Results 171 to 180 of about 6,104 (190)
Some of the next articles are maybe not open access.
Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors
2021Public-key cryptography based on the lattice problem is efficient and believed to be secure in a post-quantum era. In this paper, we introduce carefully-optimized implementations of Kyber encryption schemes for 64-bit ARM Cortex-A processors. Our research contribution includes optimizations for Number Theoretic Transform (NTT), noise sampling, and AES ...
Pakize Sanal +4 more
openaire +1 more source
Instruction-Set Accelerated Implementation of CRYSTALS-Kyber
IEEE Transactions on Circuits and Systems I: Regular Papers, 2021Large scale quantum computers will break classical public-key cryptography protocols by quantum algorithms such as Shor’s algorithm. Hence, designing quantum-safe cryptosystems to replace current classical algorithms is crucial. Luckily there are some post-quantum candidates that are assumed to be resistant against future attacks from quantum computers,
Mojtaba Bisheh-Niasar +2 more
openaire +1 more source
2023
The expected arrival of powerful quantum computers within the near future represents a great challenge to our modern-day cryptography. Symmetric key encryption is not considered to be vulnerable against attacks by quantum computers if the key size is doubled. Asymmetric cryptography, however, is shown to be susceptible to quantum attacks. In this paper
Lawo, Daniel +4 more
openaire +1 more source
The expected arrival of powerful quantum computers within the near future represents a great challenge to our modern-day cryptography. Symmetric key encryption is not considered to be vulnerable against attacks by quantum computers if the key size is doubled. Asymmetric cryptography, however, is shown to be susceptible to quantum attacks. In this paper
Lawo, Daniel +4 more
openaire +1 more source
Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within a Bio-KEM Framework
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023Junwei Yu +4 more
openaire +1 more source
Kyber, Manfred: Tiergeschichten
The German Quarterly, 1932Frances E. Myer, E. P. Kremer
openaire +1 more source
Quantum pairwise-parallel mismatch attack on Kyber
Physica ScriptaAbstract Quantum algorithm uses the quantum parallel method to calculate, which can better solve the encryption and decryption problems in cryptography and secure communication. This paper proposeS a quantum pairwise-parallel mismatch attack on Kyber using the quantum binary search method. We first give quantum search methods for finding
Yaru Wang, Jianmei Liu
openaire +1 more source
Chosen ciphertext correlation power analysis on Kyber
Integration, 2023Yipei Yang +7 more
openaire +1 more source
Low latency FPGA implementation of NTT for Kyber
Microprocessors and Microsystems, 2023Mohamed Saoudi +4 more
openaire +1 more source
Efficient Implementation of Kyber on Mobile Devices
2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), 2021Lirui Zhao +4 more
openaire +1 more source

