A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture [PDF]
The advancement of quantum computing threatens the security of conventional public-key cryptosystems. Post-quantum cryptography (PQC) was introduced to ensure data confidentiality in communication channels, and various algorithms are being developed. The
Jihye Lee, Whijin Kim, Ji-Hoon Kim
doaj +2 more sources
Quantum Misuse Attack on Frodo [PDF]
Research on the security of lattice-based public-key encryption schemes against misuse attacks is an important part of the cryptographic assessment of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Yaru Wang, Haodong Jiang, Zhi Ma
doaj +2 more sources
In-line rate encrypted links using pre-shared post-quantum keys and DPUs [PDF]
The development of quantum computers poses a risk to the cryptographic algorithms utilized by current public key infrastructure (PKI). High performance computing (HPC), inter- and intra-datacenter communications, and governmental communications are ...
Abraham Cano Aguilera +5 more
doaj +2 more sources
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms [PDF]
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Sana Farooq +6 more
doaj +2 more sources
A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications [PDF]
The security of Smart Meter (SM) systems will be a challenge in the era of quantum computing because a quantum computer might exploit characteristics of well-established cryptographic schemes to reach a successful security breach.
Vinícius Lagrota Rodrigues da Costa +2 more
doaj +2 more sources
Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution [PDF]
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei +3 more
doaj +4 more sources
The Future of Cybersecurity in the Age of Quantum Computers
The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a ...
Fazal Raheman
doaj +1 more source
Falcon is one of the promising digital-signature algorithms in NIST’s ongoing Post-Quantum Cryptography (PQC) standardization finalist. Computational efficiency regarding software and hardware is also the main criteria for PQC standardization.
Youngbeom Kim +2 more
doaj +1 more source
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging [PDF]
ISO 15118 enables charging and billing of Electric Vehicles (EVs) without user interaction by using locally installed cryptographic credentials that must be secure over the long lifetime of vehicles.
Alnahawi, Nouri +5 more
core +1 more source
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
BIKE is a key encapsulation mechanism that entered the third round of the NIST post-quantum cryptography standardization process. This paper presents two constant-time implementations for BIKE, one tailored for the Intel Haswell and one tailored for the ...
Ming-Shing Chen +2 more
doaj +1 more source

