Results 21 to 30 of about 6,039 (185)
PUF-Kyber: Design of a PUF-Based Kyber Architecture Benchmarked on Diverse ARM Processors
<p>In this paper, through using physical unclonable functions (PUF) and true random number generators (TRNG), we improve the overall security of CRYSTALS-Kyber and provide physical security to it. Our implementation results on ARMv7 and ARMv8 architectures indicate significant speedup, compared to the reference work.</p>
Saeed Aghapour +4 more
openaire +1 more source
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
The module learning with errors (MLWE) problem has attracted considerable attention for its tradeoff between security and efficiency. The quantum/classical worst‐case to average‐case hardness for the MLWE problem (or more exactly, a family of problems) has been established, but most of the known results require the seed distribution to be the uniform ...
Wenjuan Jia, Baocang Wang, Youwen Zhu
wiley +1 more source
Hardness of Module‐LWE with Semiuniform Seeds from Module‐NTRU
The module learning with errors (MLWE) problem has attracted significant attention and has been widely used in building a multitude of lattice‐based cryptographic primitives. The hardness of the MLWE problem has been established for several variants, but most of the known results require the seed distribution (i.e., the distribution of matrix A) to be ...
Wenjuan Jia +3 more
wiley +1 more source
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given ...
Gokulnath Rajendran +4 more
doaj +1 more source
Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing [PDF]
Financial institutions continue to face evolving cyber security threats that require immediate detection and mitigation to prevent significant damage. Classical-based cyber security mechanisms struggle to keep up with these emerging threats due to their ...
Jean Marie Vianney Sindayigaya
doaj +1 more source
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption
Masking is the main countermeasure against side-channel attacks on embedded devices. For cryptographic algorithms that combine Boolean and arithmetic masking, one must therefore convert between the two types of masking, without leaking additional ...
Jean-Sébastien Coron +3 more
doaj +1 more source
Contains fulltext : 315394.pdf (Publisher’s version ) (Open Access)
Barbosa, M., Schwabe, P.
openaire +1 more source
NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song +4 more
doaj +1 more source
Cortex-M4 optimizations for {R,M} LWE schemes
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using the Number Theoretic Transform (NTT) on the popular ARM Cortex-M4 microcontroller.
Erdem Alkim +3 more
doaj +1 more source

