Results 11 to 20 of about 6,039 (185)

Falcon/Kyber and Dilithium/Kyber Network Stack on Nvidia’s Data Processing Unit Platform

open access: yesIEEE Access
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today’s communication.
D. C. Lawo   +7 more
doaj   +4 more sources

Masking Kyber: First- and Higher-Order Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In the final phase of the post-quantum cryptography standardization effort, the focus has been extended to include the side-channel resistance of the candidates.
Joppe W. Bos   +4 more
doaj   +3 more sources

Towards CRYSTALS-Kyber VHDL Implementation [PDF]

open access: yesProceedings of the 18th International Conference on Security and Cryptography, 2021
Kyber is one of the three finalists of the National Institute of Standards and Technology (NIST) post-quantum cryptography competition. This article presents an optimized Very High Speed Integrated Circuit Hardware Description Language (VHDL)-based implementation of the main components of the Kyber scheme, namely Number-Theoretic Transform (NTT) and ...
Ricci, Sara   +5 more
openaire   +2 more sources

Lattice codes for CRYSTALS-Kyber

open access: yesDesigns, Codes and Cryptography, 2023
<p>This letter describes a lattice encoder for the NIST-recommended post-quantum encryption algorithm: Kyber. The key idea is to refine the analysis of Kyber decoding noise. We prove that Kyber decoding noise can be bounded by a sphere. This result shows the Kyber encoding problem is essentially a sphere packing in a hypercube.
Amin Sakzad, Shuiyin Liu
openaire   +2 more sources

Fault-Enabled Chosen-Ciphertext Attacks on Kyber [PDF]

open access: yes, 2021
NIST's PQC standardization process is in the third round, and a first final choice between one of three remaining lattice-based key encapsulation mechanisms is expected by the end of 2021. This makes studying the implementation-security aspect of the candidates a pressing matter.
Hermelink, Julius   +2 more
openaire   +1 more source

Post-quantum Anonymity of Kyber

open access: yes, 2023
Lecture Notes in Computer Science ...
Maram, Varun, Xagawa, Keita
openaire   +2 more sources

First end‐to‐end PQC protected DPU‐to‐DPU communications

open access: yesElectronics Letters, Volume 59, Issue 17, September 2023., 2023
This letter presents the first post‐quantum link between data processing units. It uses the quantum resilient algorithms Dilihtium and Kyber for authentication and key exchange respectively and AES‐256 for encrypting application data. Abstract The appearance of quantum computing in the short foreseeable future and its capability to break conventional ...
A. Cano Aguilera   +4 more
wiley   +1 more source

Secure post‐quantum group key exchange: Implementing a solution based on Kyber

open access: yesIET Communications, Volume 17, Issue 6, Page 758-773, April 2023., 2023
In this article, the authors report on the implementation of a post‐quantum group key exchange protocol, which is proven secure in the so‐called Quantum Random Oracle Model. It is based on a two‐party design called Kyber, which is a finalist in the NIST standardization contest for post‐quantum cryptographic designs.
José Ignacio Escribano Pablos   +1 more
wiley   +1 more source

Neural superposition and oscillations in the eye of the blowfly [PDF]

open access: yes, 1987
Neural superposition in the eye of the blowfly Calliphora erythrocephala was investigated by stimulating single photoreceptors using corneal neutralization through water immersion.
D Burkhardt   +18 more
core   +2 more sources

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, Volume 17, Issue 2, Page 227-243, March 2023., 2023
Abstract The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives. Due to solid security and desirable performance, lattice‐based cryptosystems are viewed as promising candidates in the upcoming ...
Anyu Wang, Dianyan Xiao, Yang Yu
wiley   +1 more source

Home - About - Disclaimer - Privacy