Results 21 to 30 of about 1,873 (168)
Polynomial equation in algebraic attack on NTRU-HPS and NTRU-HRSS [PDF]
NTRU is a lattice-based public-key cryptosystem designed by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Paradise Fadila, Sugeng Kiki Ariyanti
doaj +1 more source
Single-Trace Attacks on Message Encoding in Lattice-Based KEMs
In this article, we propose single-trace side-channel attacks against lattice-based key encapsulation mechanisms (KEMs) that are the third-round candidates of the national institute of standards and technology (NIST) standardization project. Specifically,
Bo-Yeon Sim +8 more
doaj +1 more source
Ramanujan graphs in cryptography [PDF]
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in ...
Costache, Anamaria +4 more
core +2 more sources
On the Performance and Security of Multiplication in GF(2N)
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger +8 more
doaj +1 more source
A Prototype for evaluating Post-Quantum Cryptography on resource-constrained Hardware with real-world Smart City Sensor Data [PDF]
As the threat of quantum computing to classical cryptography grows, the transition to post-quantum cryptographic (PQC) systems becomes essential—particularly for smart city infrastructures that rely heavily on secure, real-time sensor data.
J. Seedorf +5 more
doaj +1 more source
Classic McEliece on the ARM Cortex-M4
This paper presents a constant-time implementation of Classic McEliece for ARM Cortex-M4. Specifically, our target platform is stm32f4-Discovery, a development board on which the amount of SRAM is not even large enough to hold the public key of the ...
Ming-Shing Chen, Tung Chou
doaj +1 more source
Cache-Timing Attack Against HQC
In this paper, we present the first chosen-ciphertext (CC) cache-timing attacks on the reference implementation of HQC. We build a cache-timing based distinguisher for implementing a plaintext-checking (PC) oracle.
Senyang Huang +4 more
doaj +1 more source
Security of currently deployed public key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, i.e., algorithms that are resistant ...
Abideen, Zain Ul +2 more
core +1 more source
Isogeny-based post-quantum key exchange protocols [PDF]
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core
Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC [PDF]
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development.
de Jong, Jins +4 more
core +3 more sources

