Results 11 to 20 of about 6,104 (190)
Falcon/Kyber and Dilithium/Kyber Network Stack on Nvidia’s Data Processing Unit Platform
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today’s communication.
D. C. Lawo +7 more
doaj +4 more sources
Masking Kyber: First- and Higher-Order Implementations
In the final phase of the post-quantum cryptography standardization effort, the focus has been extended to include the side-channel resistance of the candidates.
Joppe W. Bos +4 more
doaj +3 more sources
Towards CRYSTALS-Kyber VHDL Implementation [PDF]
Kyber is one of the three finalists of the National Institute of Standards and Technology (NIST) post-quantum cryptography competition. This article presents an optimized Very High Speed Integrated Circuit Hardware Description Language (VHDL)-based implementation of the main components of the Kyber scheme, namely Number-Theoretic Transform (NTT) and ...
Ricci, Sara +5 more
openaire +2 more sources
Lattice codes for CRYSTALS-Kyber
<p>This letter describes a lattice encoder for the NIST-recommended post-quantum encryption algorithm: Kyber. The key idea is to refine the analysis of Kyber decoding noise. We prove that Kyber decoding noise can be bounded by a sphere. This result shows the Kyber encoding problem is essentially a sphere packing in a hypercube.
Amin Sakzad, Shuiyin Liu
openaire +2 more sources
Fault-Enabled Chosen-Ciphertext Attacks on Kyber [PDF]
NIST's PQC standardization process is in the third round, and a first final choice between one of three remaining lattice-based key encapsulation mechanisms is expected by the end of 2021. This makes studying the implementation-security aspect of the candidates a pressing matter.
Hermelink, Julius +2 more
openaire +1 more source
Post-quantum Anonymity of Kyber
Lecture Notes in Computer Science ...
Maram, Varun, Xagawa, Keita
openaire +2 more sources
PUF-Kyber: Design of a PUF-Based Kyber Architecture Benchmarked on Diverse ARM Processors
<p>In this paper, through using physical unclonable functions (PUF) and true random number generators (TRNG), we improve the overall security of CRYSTALS-Kyber and provide physical security to it. Our implementation results on ARMv7 and ARMv8 architectures indicate significant speedup, compared to the reference work.</p>
Saeed Aghapour +4 more
openaire +1 more source
First end‐to‐end PQC protected DPU‐to‐DPU communications
This letter presents the first post‐quantum link between data processing units. It uses the quantum resilient algorithms Dilihtium and Kyber for authentication and key exchange respectively and AES‐256 for encrypting application data. Abstract The appearance of quantum computing in the short foreseeable future and its capability to break conventional ...
A. Cano Aguilera +4 more
wiley +1 more source
Secure post‐quantum group key exchange: Implementing a solution based on Kyber
In this article, the authors report on the implementation of a post‐quantum group key exchange protocol, which is proven secure in the so‐called Quantum Random Oracle Model. It is based on a two‐party design called Kyber, which is a finalist in the NIST standardization contest for post‐quantum cryptographic designs.
José Ignacio Escribano Pablos +1 more
wiley +1 more source
Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing [PDF]
Financial institutions continue to face evolving cyber security threats that require immediate detection and mitigation to prevent significant damage. Classical-based cyber security mechanisms struggle to keep up with these emerging threats due to their ...
Jean Marie Vianney Sindayigaya
doaj +1 more source

