Results 101 to 110 of about 2,892 (213)

Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations

open access: yesCryptography
Quantum computing challenges the mathematical problems anchoring the security of the classical public key algorithms. For quantum-resistant public key algorithms, the National Institute of Standards and Technology (NIST) has undergone a multi-year ...
Manohar Raavi   +5 more
doaj   +1 more source

Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code

open access: yes, 2023
Although cryptographic algorithms may be mathematically secure, it is often possible to leak secret information from the implementation of the algorithms.
Erata, Ferhat   +3 more
core  

Resilience of Post-Quantum Cryptography in Lightweight IoT Protocols: A Systematic Review

open access: yesEng
The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud communications ...
Mohammed Almutairi, Frederick T. Sheldon
doaj   +1 more source

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +1 more source

Towards the quantum-safe web: benchmarking post-quantum TLS [PDF]

open access: yes
The transition to a quantum-resistant Internet is a complex process that depends on the integration of post-quantum cryptographic primitives into existing security protocols.
Ferraris, Davide   +3 more
core   +1 more source

Compact Hybrid Signature for Secure Transition to Post-Quantum Era

open access: yesIEEE Access
Recent advances in quantum-computing technology have threatened the security of classical cryptographic algorithms. This initiated research on Post-Quantum Cryptography (PQC), and the National Institute of Standards and Technology (NIST) PQC ...
Hee-Yong Kwon, Indra Bajuna, Mun-Kyu Lee
doaj   +1 more source

Faster multiplication in ℤ2m[x] on Cortex-M4 to speed up NIST PQC candidates

open access: yes, 2019
Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7 ...
Kannwischer, M.J.   +2 more
openaire   +1 more source

Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Kyber and Dilithium are both lattice-based post-quantum cryptography (PQC) algorithms that have been selected for standardization by the American National Institute of Standards and Technology (NIST). NIST recommends them as two primary algorithms to be
Tengfei Wang   +4 more
doaj   +1 more source

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a major part of our digital data.
Suparna Kundu   +4 more
doaj   +1 more source

From Policy to Practice: A Sector-Agnostic Operational Framework for Post-Quantum Cryptography Transition

open access: yesIEEE Access
The pace of quantum computing development necessitates not only the adoption of post-quantum cryptographic algorithms, but also the establishment of an executable and auditable institutional transition process.
Berat Birgin, Baris Celiktas
doaj   +1 more source

Home - About - Disclaimer - Privacy