Results 181 to 190 of about 6,104 (190)
Some of the next articles are maybe not open access.
An Improved Key Mismatch Attack on Kyber
2023 7th International Conference on Cryptography, Security and Privacy (CSP), 2023Yaru Wang, Haodong Jiang, Zhi Ma
openaire +1 more source
CRYSTALS - Kyber: Análisis e implementación
La llegada de los ordenadores cuánticos amenaza la seguridad de las comunicaciones, debido a que estas, por el momento, están protegidas por criptografía de clave pública (asimétrica). La fortaleza de estos algoritmos criptográficos está basada en problemas computacionalmente complejos de resolver.openaire +1 more source
HI-Kyber: A Novel High-Performance Implementation Scheme of Kyber Based on GPU
IEEE Transactions on Parallel and Distributed SystemsXinyi Ji +5 more
openaire +1 more source
La Transformada Teórica de Números para Kyber
La Transformada Teórica de Números es un método eficiente para la multiplicación de dos polinomios de grado alto, ampliamente usado para sistemas criptográficos basados en retículos como Kyber y Dilithium. Este documento se centra en el caso concreto de Kyber.Antuñano Cabrera, Néstor +6 more
openaire +1 more source
P 2 SE-Kyber: A PUF-based Physical Security Enhanced Approach for Kyber
2025 4th International Conference on Electronic Information Technology (EIT)Junwei Li +3 more
openaire +1 more source
2024 21st International SoC Design Conference (ISOCC)
Nhat Nguyen Dinh +5 more
openaire +1 more source
Nhat Nguyen Dinh +5 more
openaire +1 more source
Modular arithmetic optimization in Kyber KEM
Journal of Computer Virology and Hacking TechniquesA. S. Zelenetsky, P. G. Klyucharev
openaire +1 more source
Compact Instruction Set Extensions for Kyber
IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsLu Li, Guofeng Qin, Yang Yu, Weijia Wang
openaire +1 more source

