Results 71 to 80 of about 1,873 (168)
High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU [PDF]
Along the rapid development in building large-scale quantum computers, post-quantum cryptography (PQC) has drawn significant attention from research community recently as it is proven that the existing public-key cryptosystems are vulnerable to the ...
Elizabeth Carter +2 more
core
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang +3 more
wiley +1 more source
Quantum computing challenges the mathematical problems anchoring the security of the classical public key algorithms. For quantum-resistant public key algorithms, the National Institute of Standards and Technology (NIST) has undergone a multi-year ...
Manohar Raavi +5 more
doaj +1 more source
High-Performance NTRU Accelerator Using a Direct Memory Access Controller
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim +2 more
doaj +1 more source
Wireless and Fiber-based Post-Quantum Cryptography Secured IPsec Tunnel [PDF]
In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary ...
Abu Bakar, Rana +6 more
core +1 more source
Security analysis for BIKE, Classic McEliece and HQC against the quantum ISD algorithms [PDF]
Since 2016, NIST has been standardrizing Post-Quantum Cryptosystems, PQCs. Code-Based Cryptosystem, CBC, which is considered to be one of PQCs, uses the Syndrome Decoding Problem as the basis for its security.
Asuka Wakasugi, Mitsuru Tada
core
Compact Hybrid Signature for Secure Transition to Post-Quantum Era
Recent advances in quantum-computing technology have threatened the security of classical cryptographic algorithms. This initiated research on Post-Quantum Cryptography (PQC), and the National Institute of Standards and Technology (NIST) PQC ...
Hee-Yong Kwon, Indra Bajuna, Mun-Kyu Lee
doaj +1 more source
Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA
Kyber and Dilithium are both lattice-based post-quantum cryptography (PQC) algorithms that have been selected for standardization by the American National Institute of Standards and Technology (NIST). NIST recommends them as two primary algorithms to be
Tengfei Wang +4 more
doaj +1 more source
LESS is Even More: Optimizing Digital Signatures from Code Equivalence
LESS is a signature scheme based on the code equivalence problem that has advanced to the second round of the NIST PQC standardization process. While promising, the scheme suffers from relatively large signatures and moderate to slow signing and ...
Luke Beckwith +4 more
doaj +1 more source
Towards Managing the Migration to Post-Quantum-Cryptography
As soon as cryptographically relevant quantum computers exist, they can break today's prevalent asymmetric cryptographic algorithms. Organizations (and the IT society) have to plan on migrating to quantum-resilient cryptographic measures, also known as ...
Alnahawi, Nouri +4 more
core

