Results 21 to 30 of about 1,910 (90)

Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model [PDF]

open access: yes, 2019
The recent post-quantum cryptography standardization project launched by NIST increased the interest in generic key encapsulation mechanism (KEM) constructions in the quantum random oracle (QROM).
A Hülsing   +17 more
core   +1 more source

Аналіз актуальних проблемних питань щодо перспективної асиметричної криптографії [PDF]

open access: yes, 2019
Наведений аналіз актуальних досліджень щодо криптографії на решітках. Аналіз відбувається відповідно до найбільш актуальних алгоритмів, що пройшли до другого етапу конкурсу NIST США. Деякі з них комбіновані — включають в себе декілька схожих алгоритмів з
Акользіна, О.С.   +2 more
core   +3 more sources

A Comparison of NTRU Variants [PDF]

open access: yes, 2018
We analyze the size vs. security trade-offs that are available when selecting parameters for perfectly correct key encapsulation mechanisms based on ...
John M. Schanck
core  

Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM [PDF]

open access: yes, 2022
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalists and ...
Aydin Aysu, Emre Karabulut, Erdem Alkim
core  

Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication [PDF]

open access: yes, 2020
The threat of a cryptographically relevant quantum computer contributes to an increasing interest in the field of post-quantum cryptography (PQC). Compared to existing research efforts regarding the integration of PQC into the Transport Layer Security ...
D Micciancio   +9 more
core   +1 more source

Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber [PDF]

open access: yes, 2022
Side-channel resilience is a crucial feature when assessing whether a postquantum cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a generic and efficient adaptive approach to improve the sample complexity (i.e ...
Chi Cheng   +4 more
core   +2 more sources

Quantifying risks in cryptographic selection processes [PDF]

open access: yes, 2023
There appears to be a widespread belief that some processes of selecting cryptosystems are less risky than other processes. As a case study of quantifying the difference in risks, this paper compares the currently-known-failure rates of three large ...
Daniel J. Bernstein
core  

NIST Post-Quantum Cryptography- A Hardware Evaluation Study [PDF]

open access: yes, 2019
Experts forecast that quantum computers can break classical cryptographic algorithms. Scientists are developing post quantum cryptographic (PQC) algorithms, that are invulnerable to quantum computer attacks.
Deepraj Soni   +3 more
core  

NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme [PDF]

open access: yes, 2018
In this paper, we propose NTRU-LPR IND-CPA, a new secure scheme based on the decisional variant of Bounded Distance Decoding problem over rings (DR-BDD). This scheme is IND-CPA secure and has two KEM variants IND-CCA2 secure in the random oracle model.
Bernard Ousmane Sané   +3 more
core  

An NTRU-Based Key Encapsulation Scheme for Underwater Acoustic Communication

open access: yesElectronics
With the increasing emphasis on safeguarding maritime sovereignty and developing marine resources, the security of underwater acoustic communication has risen to a new level of importance.
Peng He, Mingze Xu
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy