Results 11 to 20 of about 89 (53)

Safe-Error Analysis of Post-Quantum Cryptography Mechanisms [PDF]

open access: yes, 2021
International audienceThe NIST selection process for standardizing Post-Quantum Cryptography Mechanisms is currently running. Many papers already studied their theoretical security, but the resistance in deployed device has not been much investigated so ...
Bettale, Luk   +2 more
core  

Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS [PDF]

open access: yes, 2021
NTRU is regarded as an appealing finalist due to its long history against all known attacks and relatively high efficiency. In the third round of the NIST competition, the submitted NTRU cryptosystem is the merger of NTRU-HPS and NTRU-HRSS.
Chi Cheng, Ruoyu Ding, Xiaohan Zhang
core  

Improved Robustness and Versatility of Lattice-Based Cryptography [PDF]

open access: yes, 2021
Current public key cryptosystems that are based on the hardness of integer factorization and discrete logarithm are insecure in the presence of large-scale quantum computers.
Gong, Huijing
core   +1 more source

Criptografía postcuántica [PDF]

open access: yes, 2021
[ES] En esta memoria se realiza un estudio donde nos adentraremos brevemente en el mundo de la Criptografía Postcuántica para estudiar algunos de los avances producidos por el NIST sobre la búsqueda de nuevos sistemas criptográficos que puedan resistir ...
Miguel Salgado, Alba
core  

Message Recovery Attack in NTRU through VFK Lattices

open access: yes, 2023
In the present paper, we implement a message recovery attack to all variants of the NTRU cryptosystem. Our approach involves a reduction from the NTRU-lattice to a Voronoi First Kind lattice, enabling the application of a polynomial CVP exact algorithm ...
Adamoudis, Marios   +3 more
core  

Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments [PDF]

open access: yes, 2022
Adopting Post-Quantum Cryptography (PQC) in network protocols is a challenging subject. Larger PQC public keys and signatures can significantly slow the Transport Layer Security (TLS) protocol.
Alexandre Augusto Giron   +3 more
core  

Efficiently Masking Polynomial Inversion at Arbitrary Order [PDF]

open access: yes, 2022
Physical side-channel analysis poses a huge threat to post-quantum cryptographic schemes implemented on embedded devices. Still, secure implementations are missing for many schemes.
Georg Land   +3 more
core  

LWE with Side Information: Attacks and Concrete Security Estimation [PDF]

open access: yes, 2022
We propose a framework for cryptanalysis of lattice-based schemes, when side information---in the form of ``hints\u27\u27--- about the secret and/or error is available.
Dana Dachman-Soled   +3 more
core  

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches [PDF]

open access: yes, 2020
Performance in hardware has typically played a major role in differentiating among leading candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic contests (Rijndael in case of AES and Keccak in case of SHA-3) were ...
Duc Tri Nguyen   +5 more
core  

Home - About - Disclaimer - Privacy