Results 31 to 40 of about 88 (52)
Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach [PDF]
Quantum computing advances threaten the security of today\u27s public key infrastructure, and have led to the pending standardization of alternative, quantum-resistant key encapsulation and digital signature cryptography schemes.
David Ott +3 more
core
Hybrid post-quantum cryptography in network protocols [PDF]
Tese (doutorado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2023.A segurança de redes é essencial para as comunicações do dia-a-dia.
Giron, Alexandre Augusto
core
Algorithmic Views of Vectorized Polynomial Multipliers -- NTRU [PDF]
The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal communication. In NTRU, polynomial multiplication is one of bottleneck.
Bo-Yin Yang +3 more
core
Non-Invertible Public Key Certificates. [PDF]
Lizama-Perez LA, López R JM.
europepmc +1 more source
Leaking-Cascade: an Optimal Construction for KEM Hybridization [PDF]
Hybrid post-quantum cryptography is a cautious approach that aims to guard against the threat posed by the quantum computer, through the simultaneous use of Post-Quantum (PQ) and classical (i.e. pre-quantum) cryptosystems, should the post-quantum schemes
Ange Martinelli +2 more
core
Efficient Noncommutative KEMs from Twisted Dihedral Group Ring [PDF]
NTRU schemes have been extensively studied as post-quantum proposals within the category of lattice-based constructions. Numerous designs have been introduced with security assumptions based on the NTRU hard problem; some focused on security, and others ...
Aditi Kar Gangopadhyay +3 more
core
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH [PDF]
Once algorithms for quantum-resistant key exchange and digital signature schemes are selected by standards bodies, adoption of post-quantum cryptography will depend on progress in integrating those algorithms into standards for communication protocols ...
Christian Paquin +2 more
core
Fault-Injection Attacks against NIST\u27s Post-Quantum Cryptography Round 3 KEM Candidates [PDF]
We investigate __all__ NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and SIKE. All KEM schemes use variants of the Fujisaki-Okamoto transformation, so
Akira Ito +4 more
core
Modular Forms and Hecke Operators for Post-Quantum Cryptography [PDF]
We introduce modular forms and Hecke operators to cryptography and propose the Hecke problem as a new foundation for post-quantum cryptography. Given two modular forms, the Hecke problem asks to recover the Hecke operator that maps one to the other ...
Trey Li
core
Almost NTRU: Revisiting Noncommutativity Against Lattice Attacks [PDF]
NTRU is one of the most extensively studied lattice-based cryptographic schemes and is widely regarded as a strong candidate for post-quantum security.
Ali Raya +3 more
core

