Towards Side-Channel Infrastructure for Software Implementations of PQC Algorithms [PDF]
Post-Quantum Cryptography (PQC) is a new class of asymmetric cryptography algorithms that are supposed to be secure against both classical computers and quantum computers through Shor’s algorithm.
Teague, Tristen
core +3 more sources
A Comprehensive Journey throughout the Development of Post-Quantum Cryptography [PDF]
[EN] This work aims at giving a comprehensive overview of the Post-Quantum Cryptography (PQC) paradigm: from its foundation and importance to its current status of development.
Blanco Chacón, Iván +2 more
core
SMAUG (-T), Revisited: Timing-Secure, More Compact, Less Failure
SMAUG-T is a Module-LWE/LWR-based Key Encapsulation Mechanism (KEM) scheme, one of the Round 2 candidates in the Korean Post-Quantum Cryptography (KpqC) Standardization Competition.
Jung Hee Cheon +3 more
doaj +1 more source
CRYSTALS-Kyber, one of the NIST PQC standardization schemes, has garnered considerable attention from researchers in recent years for its side-channel security.
Fan Huang +4 more
doaj +1 more source
Systematic Review of Lightweight Cryptographic Algorithms for IoT Security: Advances and Trends [PDF]
The proliferation of the Internet of Things (IoT) has fundamentally transformed modern infrastructure, but has also intensified security risks due to device resource constraints and interconnected environments. This systematic review synthesizes research
A, Shilpa Shetty +3 more
core +2 more sources
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security.
Gregory Fitzgibbon, Carlo Ottaviani
doaj +1 more source
FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation
Falcon is a lattice-based quantum-resistant digital signature scheme renowned for its high signature generation/verification speed and compact signature size. The scheme has been selected to be drafted in the third round of the post-quantum cryptography
Yi Ouyang +9 more
doaj +1 more source
Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI).
Qaiser Khan +2 more
doaj +1 more source
Accelerating Post-Quantum Cryptography Algorithms on the Nvidia Bluefield 3 DPU: An Active Analysis [PDF]
As the development of powerful quantum computers progresses, the threat to public key cryptography posed by the Shor algorithm is becoming increasingly serious.
Meinl, Lukas
core +1 more source
NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj +1 more source

