Results 11 to 20 of about 88 (52)

Homomorphic Evaluation of the Integer Arithmetic Operations for Mobile Edge Computing

open access: yesWireless Communications and Mobile Computing, Volume 2018, Issue 1, 2018., 2018
With the rapid development of the 5G network and Internet of Things (IoT), lots of mobile and IoT devices generate massive amounts of multisource heterogeneous data. Effective processing of such data becomes an urgent problem. However, traditional centralised models of cloud computing are challenging to process multisource heterogeneous data ...
Changqing Gong   +5 more
wiley   +1 more source

Message Recovery Attack in NTRU through VFK Lattices

open access: yes, 2023
In the present paper, we implement a message recovery attack to all variants of the NTRU cryptosystem. Our approach involves a reduction from the NTRU-lattice to a Voronoi First Kind lattice, enabling the application of a polynomial CVP exact algorithm ...
Adamoudis, Marios   +3 more
core  

Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments [PDF]

open access: yes, 2022
Adopting Post-Quantum Cryptography (PQC) in network protocols is a challenging subject. Larger PQC public keys and signatures can significantly slow the Transport Layer Security (TLS) protocol.
Alexandre Augusto Giron   +3 more
core  

Efficiently Masking Polynomial Inversion at Arbitrary Order [PDF]

open access: yes, 2022
Physical side-channel analysis poses a huge threat to post-quantum cryptographic schemes implemented on embedded devices. Still, secure implementations are missing for many schemes.
Georg Land   +3 more
core  

LWE with Side Information: Attacks and Concrete Security Estimation [PDF]

open access: yes, 2022
We propose a framework for cryptanalysis of lattice-based schemes, when side information---in the form of ``hints\u27\u27--- about the secret and/or error is available.
Dana Dachman-Soled   +3 more
core  

Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches [PDF]

open access: yes, 2020
Performance in hardware has typically played a major role in differentiating among leading candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic contests (Rijndael in case of AES and Keccak in case of SHA-3) were ...
Duc Tri Nguyen   +5 more
core  

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

A Side-Channel Assisted Attack on NTRU [PDF]

open access: yes, 2021
We take a look at the current implementation of NTRU submitted to the NIST post-quantum standardization project, and identify two strong sources of leakage in the unpacking of the secret key.
Amund Askeland, Sondre Rønjom
core  

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4 [PDF]

open access: yes, 2022
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Bo-Yin Yang, Erdem Alkim, Vincent Hwang
core   +1 more source

Home - About - Disclaimer - Privacy