Results 21 to 30 of about 6,039 (185)

Teknologia arktisuuden hyödyntämisessä [PDF]

open access: yes, 2016
201
Backman, Juha   +4 more
core   +4 more sources

PUF-Kyber: Design of a PUF-Based Kyber Architecture Benchmarked on Diverse ARM Processors

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
<p>In this paper, through using physical unclonable functions (PUF) and true random number generators (TRNG), we improve the overall security of CRYSTALS-Kyber and provide physical security to it. Our implementation results on ARMv7 and ARMv8 architectures indicate significant speedup, compared to the reference work.</p>
Saeed Aghapour   +4 more
openaire   +1 more source

Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
The module learning with errors (MLWE) problem has attracted considerable attention for its tradeoff between security and efficiency. The quantum/classical worst‐case to average‐case hardness for the MLWE problem (or more exactly, a family of problems) has been established, but most of the known results require the seed distribution to be the uniform ...
Wenjuan Jia, Baocang Wang, Youwen Zhu
wiley   +1 more source

Hardness of Module‐LWE with Semiuniform Seeds from Module‐NTRU

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
The module learning with errors (MLWE) problem has attracted significant attention and has been widely used in building a multitude of lattice‐based cryptographic primitives. The hardness of the MLWE problem has been established for several variants, but most of the known results require the seed distribution (i.e., the distribution of matrix A) to be ...
Wenjuan Jia   +3 more
wiley   +1 more source

Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given ...
Gokulnath Rajendran   +4 more
doaj   +1 more source

Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
Financial institutions continue to face evolving cyber security threats that require immediate detection and mitigation to prevent significant damage. Classical-based cyber security mechanisms struggle to keep up with these emerging threats due to their ...
Jean Marie Vianney Sindayigaya
doaj   +1 more source

High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Masking is the main countermeasure against side-channel attacks on embedded devices. For cryptographic algorithms that combine Boolean and arithmetic masking, one must therefore convert between the two types of masking, without leaking additional ...
Jean-Sébastien Coron   +3 more
doaj   +1 more source

Kyber terminates [PDF]

open access: yesPolynesian Journal of Mathematics
Contains fulltext : 315394.pdf (Publisher’s version ) (Open Access)
Barbosa, M., Schwabe, P.
openaire   +1 more source

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

open access: yesApplied Sciences, 2023
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song   +4 more
doaj   +1 more source

Cortex-M4 optimizations for {R,M} LWE schemes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using the Number Theoretic Transform (NTT) on the popular ARM Cortex-M4 microcontroller.
Erdem Alkim   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy