Results 1 to 10 of about 2,892 (213)

Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals [PDF]

open access: goldIET Information Security, 2023
SCOPUS: ed.j ; SCOPUS: ed.j ; info:eu-repo/semantics ...
Ayoub Otmani   +2 more
doaj   +3 more sources

A Systematic Study of Lattice-based NIST PQC Algorithms: from Reference Implementations to Hardware Accelerators [PDF]

open access: green, 2020
Security of currently deployed public key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, i.e., algorithms that are resistant to quantum attacks.
Malik Imran   +2 more
core   +5 more sources

A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture [PDF]

open access: yesSensors, 2023
The advancement of quantum computing threatens the security of conventional public-key cryptosystems. Post-quantum cryptography (PQC) was introduced to ensure data confidentiality in communication channels, and various algorithms are being developed. The
Jihye Lee, Whijin Kim, Ji-Hoon Kim
doaj   +2 more sources

A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100 [PDF]

open access: goldIEEE Access, 2021
Polynomial multiplication is one of the heaviest operations for a lattice-based public key algorithm in Post-Quantum Cryptography (PQC). Many studies have been done to accelerate polynomial multiplication with newly developed hardware accelerators or special CPU instructions.
Jong-Yeon Park   +4 more
openalex   +3 more sources

NIST PQC: Code-Based Cryptosystems

open access: diamondRadiotekhnika, 2018
The code-based schemes, which were submitted to the contest of post-quantum crypto algorithms NIST PQC, are studied in this work. The general characteristics of the algorithms are explored and basic properties and parameters are estimated. A comparative analysis of the electronic digital signature schemes, public-key cryptosystems and key encapsulation
Alexandr Kuznetsov   +4 more
openalex   +4 more sources

Analysis of the RAINBOW post-quantum electronic signature algorithm state and attacks on it for the period of the NIST PQC third round completion

open access: diamondRadiotekhnika, 2022
The paper identifies and analyzes attacks aimed at cryptanalysis of the Rainbow post-quantum electronic signature algorithm and the state of this electronic signature within the framework of the NIST PQC competition and as a whole. The Rainbow electronic signature as a candidate in the third round of the NIST PQC was examined in detail for the ...
Ye.Yu. Kaptiol
  +6 more sources

Research and analysis of implementations of the NIST PQC competition second round candidates focused on the Xilinx FPGA family

open access: diamondRadiotekhnika, 2021
Today, the question of the stability of modern existing cryptographic mechanisms to quantum algorithms of cryptanalysis in particular and quantum computers in general is quite acute. This issue is actively discussed at the international level. Therefore, to solve it, NIST USA has decided to organize and is currently holding a competition for candidates
M.V. Yesina, B.S. Shahov
  +6 more sources

Classical Misuse Attacks on NIST Round 2 PQC

open access: green, 2020
The US National Institute of Standards and Technology (NIST) recently announced the public-key cryptosystems (\(\mathsf {PKC}\)) that have passed to the second round of the post-quantum standardization process. Most of these \(\mathsf {PKC}\) come in two flavours: a weak IND-CPA version and a strongly secure IND-CCA construction. For the weaker scheme,
Loïs Huguenin-Dumittan, Serge Vaudenay
openalex   +3 more sources

Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project [PDF]

open access: closedIET Information Security, 2018
Hamming quasi‐cyclic (HQC) cryptosystem, proposed by Aguilar Melchor et al ., is a code‐based key encapsulation mechanism (KEM) submitted for the NIST standardisation process of post‐quantum cryptography (PQC).
Zhen Liu, Yanbin Pan, Tianyuan Xie
openalex   +2 more sources

Home - About - Disclaimer - Privacy