Results 11 to 20 of about 6,039 (185)
Falcon/Kyber and Dilithium/Kyber Network Stack on Nvidia’s Data Processing Unit Platform
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today’s communication.
D. C. Lawo +7 more
doaj +4 more sources
Masking Kyber: First- and Higher-Order Implementations
In the final phase of the post-quantum cryptography standardization effort, the focus has been extended to include the side-channel resistance of the candidates.
Joppe W. Bos +4 more
doaj +3 more sources
Towards CRYSTALS-Kyber VHDL Implementation [PDF]
Kyber is one of the three finalists of the National Institute of Standards and Technology (NIST) post-quantum cryptography competition. This article presents an optimized Very High Speed Integrated Circuit Hardware Description Language (VHDL)-based implementation of the main components of the Kyber scheme, namely Number-Theoretic Transform (NTT) and ...
Ricci, Sara +5 more
openaire +2 more sources
Lattice codes for CRYSTALS-Kyber
<p>This letter describes a lattice encoder for the NIST-recommended post-quantum encryption algorithm: Kyber. The key idea is to refine the analysis of Kyber decoding noise. We prove that Kyber decoding noise can be bounded by a sphere. This result shows the Kyber encoding problem is essentially a sphere packing in a hypercube.
Amin Sakzad, Shuiyin Liu
openaire +2 more sources
Fault-Enabled Chosen-Ciphertext Attacks on Kyber [PDF]
NIST's PQC standardization process is in the third round, and a first final choice between one of three remaining lattice-based key encapsulation mechanisms is expected by the end of 2021. This makes studying the implementation-security aspect of the candidates a pressing matter.
Hermelink, Julius +2 more
openaire +1 more source
Post-quantum Anonymity of Kyber
Lecture Notes in Computer Science ...
Maram, Varun, Xagawa, Keita
openaire +2 more sources
First end‐to‐end PQC protected DPU‐to‐DPU communications
This letter presents the first post‐quantum link between data processing units. It uses the quantum resilient algorithms Dilihtium and Kyber for authentication and key exchange respectively and AES‐256 for encrypting application data. Abstract The appearance of quantum computing in the short foreseeable future and its capability to break conventional ...
A. Cano Aguilera +4 more
wiley +1 more source
Secure post‐quantum group key exchange: Implementing a solution based on Kyber
In this article, the authors report on the implementation of a post‐quantum group key exchange protocol, which is proven secure in the so‐called Quantum Random Oracle Model. It is based on a two‐party design called Kyber, which is a finalist in the NIST standardization contest for post‐quantum cryptographic designs.
José Ignacio Escribano Pablos +1 more
wiley +1 more source
Neural superposition and oscillations in the eye of the blowfly [PDF]
Neural superposition in the eye of the blowfly Calliphora erythrocephala was investigated by stimulating single photoreceptors using corneal neutralization through water immersion.
D Burkhardt +18 more
core +2 more sources
Lattice‐based cryptosystems in standardisation processes: A survey
Abstract The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives. Due to solid security and desirable performance, lattice‐based cryptosystems are viewed as promising candidates in the upcoming ...
Anyu Wang, Dianyan Xiao, Yang Yu
wiley +1 more source

