Results 81 to 90 of about 1,873 (168)

Towards Side-Channel Infrastructure for Software Implementations of PQC Algorithms [PDF]

open access: yes
Post-Quantum Cryptography (PQC) is a new class of asymmetric cryptography algorithms that are supposed to be secure against both classical computers and quantum computers through Shor’s algorithm.
Teague, Tristen
core   +3 more sources

A Comprehensive Journey throughout the Development of Post-Quantum Cryptography [PDF]

open access: yes
[EN] This work aims at giving a comprehensive overview of the Post-Quantum Cryptography (PQC) paradigm: from its foundation and importance to its current status of development.
Blanco Chacón, Iván   +2 more
core  

SMAUG (-T), Revisited: Timing-Secure, More Compact, Less Failure

open access: yesIEEE Access
SMAUG-T is a Module-LWE/LWR-based Key Encapsulation Mechanism (KEM) scheme, one of the Round 2 candidates in the Korean Post-Quantum Cryptography (KpqC) Standardization Competition.
Jung Hee Cheon   +3 more
doaj   +1 more source

MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
CRYSTALS-Kyber, one of the NIST PQC standardization schemes, has garnered considerable attention from researchers in recent years for its side-channel security.
Fan Huang   +4 more
doaj   +1 more source

Systematic Review of Lightweight Cryptographic Algorithms for IoT Security: Advances and Trends [PDF]

open access: yes
The proliferation of the Internet of Things (IoT) has fundamentally transformed modern infrastructure, but has also intensified security risks due to device resource constraints and interconnected environments. This systematic review synthesizes research
A, Shilpa Shetty   +3 more
core   +2 more sources

Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography

open access: yesCryptography
Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security.
Gregory Fitzgibbon, Carlo Ottaviani
doaj   +1 more source

FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Falcon is a lattice-based quantum-resistant digital signature scheme renowned for its high signature generation/verification speed and compact signature size. The scheme has been selected to be drafted in the third round of the post-quantum cryptography
Yi Ouyang   +9 more
doaj   +1 more source

Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)

open access: yesInformation
5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI).
Qaiser Khan   +2 more
doaj   +1 more source

Accelerating Post-Quantum Cryptography Algorithms on the Nvidia Bluefield 3 DPU: An Active Analysis [PDF]

open access: yes
As the development of powerful quantum computers progresses, the threat to public key cryptography posed by the Shor algorithm is becoming increasingly serious.
Meinl, Lukas
core   +1 more source

NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy