Results 71 to 80 of about 1,873 (168)

High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU [PDF]

open access: yes, 2022
Along the rapid development in building large-scale quantum computers, post-quantum cryptography (PQC) has drawn significant attention from research community recently as it is proven that the existing public-key cryptosystems are vulnerable to the ...
Elizabeth Carter   +2 more
core  

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Lattice‐based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security. We quantitatively analyze how the floating‐point arithmetic and neglecting small probabilities impact the precision, and propose a new ...
Lin Wang   +3 more
wiley   +1 more source

Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations

open access: yesCryptography
Quantum computing challenges the mathematical problems anchoring the security of the classical public key algorithms. For quantum-resistant public key algorithms, the National Institute of Standards and Technology (NIST) has undergone a multi-year ...
Manohar Raavi   +5 more
doaj   +1 more source

High-Performance NTRU Accelerator Using a Direct Memory Access Controller

open access: yesIEEE Access
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim   +2 more
doaj   +1 more source

Wireless and Fiber-based Post-Quantum Cryptography Secured IPsec Tunnel [PDF]

open access: yes
In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary ...
Abu Bakar, Rana   +6 more
core   +1 more source

Security analysis for BIKE, Classic McEliece and HQC against the quantum ISD algorithms [PDF]

open access: yes, 2022
Since 2016, NIST has been standardrizing Post-Quantum Cryptosystems, PQCs. Code-Based Cryptosystem, CBC, which is considered to be one of PQCs, uses the Syndrome Decoding Problem as the basis for its security.
Asuka Wakasugi, Mitsuru Tada
core  

Compact Hybrid Signature for Secure Transition to Post-Quantum Era

open access: yesIEEE Access
Recent advances in quantum-computing technology have threatened the security of classical cryptographic algorithms. This initiated research on Post-Quantum Cryptography (PQC), and the National Institute of Standards and Technology (NIST) PQC ...
Hee-Yong Kwon, Indra Bajuna, Mun-Kyu Lee
doaj   +1 more source

Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Kyber and Dilithium are both lattice-based post-quantum cryptography (PQC) algorithms that have been selected for standardization by the American National Institute of Standards and Technology (NIST). NIST recommends them as two primary algorithms to be
Tengfei Wang   +4 more
doaj   +1 more source

LESS is Even More: Optimizing Digital Signatures from Code Equivalence

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
LESS is a signature scheme based on the code equivalence problem that has advanced to the second round of the NIST PQC standardization process. While promising, the scheme suffers from relatively large signatures and moderate to slow signing and ...
Luke Beckwith   +4 more
doaj   +1 more source

Towards Managing the Migration to Post-Quantum-Cryptography

open access: yes, 2023
As soon as cryptographically relevant quantum computers exist, they can break today's prevalent asymmetric cryptographic algorithms. Organizations (and the IT society) have to plan on migrating to quantum-resilient cryptographic measures, also known as ...
Alnahawi, Nouri   +4 more
core  

Home - About - Disclaimer - Privacy