Results 31 to 40 of about 89 (53)

A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling [PDF]

open access: yes, 2023
The sampling of polynomials with fixed weight is a procedure required by round-4 Key Encapsulation Mechanisms (KEMs) for Post-Quantum Cryptography (PQC) standardization (BIKE, HQC, McEliece) as well as NTRU, Streamlined NTRU Prime, and NTRU LPRrime ...
Georg Land   +3 more
core  

Доведення без розголошення на основі криптосистем, стійкість яких базується на задачах навчання з помилками [PDF]

open access: yes, 2021
Метою дипломної роботи є доведення без розголошення для криптосистем, стiйкiсть яких базується на задачах навчання з помилками, що забезпечить якiсне використання таких структур у криптографiї.
Тузовська, Марія Андріївна
core  

Quantum Key Search for Ternary LWE [PDF]

open access: yes, 2021
Ternary LWE, i.e., LWE with coefficients of the secret and the error vectors taken from $\{-1, 0, 1\}$, is a popular choice among NTRU-type cryptosystems and some signatures schemes like BLISS and GLP.
Alexander May   +2 more
core  

Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach [PDF]

open access: yes, 2022
Quantum computing advances threaten the security of today\u27s public key infrastructure, and have led to the pending standardization of alternative, quantum-resistant key encapsulation and digital signature cryptography schemes.
David Ott   +3 more
core  

Hybrid post-quantum cryptography in network protocols [PDF]

open access: yes, 2023
Tese (doutorado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2023.A segurança de redes é essencial para as comunicações do dia-a-dia.
Giron, Alexandre Augusto
core  

Algorithmic Views of Vectorized Polynomial Multipliers -- NTRU [PDF]

open access: yes, 2023
The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal communication. In NTRU, polynomial multiplication is one of bottleneck.
Bo-Yin Yang   +3 more
core  

Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH [PDF]

open access: yes, 2019
Once algorithms for quantum-resistant key exchange and digital signature schemes are selected by standards bodies, adoption of post-quantum cryptography will depend on progress in integrating those algorithms into standards for communication protocols ...
Christian Paquin   +2 more
core  

Leaking-Cascade: an Optimal Construction for KEM Hybridization [PDF]

open access: yes, 2023
Hybrid post-quantum cryptography is a cautious approach that aims to guard against the threat posed by the quantum computer, through the simultaneous use of Post-Quantum (PQ) and classical (i.e. pre-quantum) cryptosystems, should the post-quantum schemes
Ange Martinelli   +2 more
core  

Efficient Noncommutative KEMs from Twisted Dihedral Group Ring [PDF]

open access: yes
NTRU schemes have been extensively studied as post-quantum proposals within the category of lattice-based constructions. Numerous designs have been introduced with security assumptions based on the NTRU hard problem; some focused on security, and others ...
Aditi Kar Gangopadhyay   +3 more
core  

Fault-Injection Attacks against NIST\u27s Post-Quantum Cryptography Round 3 KEM Candidates [PDF]

open access: yes, 2021
We investigate __all__ NIST PQC Round 3 KEM candidates from the viewpoint of fault-injection attacks: Classic McEliece, Kyber, NTRU, Saber, BIKE, FrodoKEM, HQC, NTRU Prime, and SIKE. All KEM schemes use variants of the Fujisaki-Okamoto transformation, so
Akira Ito   +4 more
core  

Home - About - Disclaimer - Privacy