A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs [PDF]
The research on the key mismatch attacks against the lattice-based KEMs is an important part of the cryptographic assessment of the ongoing NIST standardization. There have been a number of these attacks. However, a unified method to evaluate these KEMs\
Chi Cheng +5 more
core
DAWN: Smaller and Faster NTRU Encryption via Double Encoding [PDF]
This paper introduces DAWN, a compact and efficient NTRU encryption utilizing double encoding, which is provably secure under the NTRU assumption and the Ring-LWE assumption.
Xianhui Lu +4 more
core
This paper highlights a particular construction of a correct KEM without failures and without ciphertext expansion from any correct deterministic PKE, and presents a simple tight proof of ROM IND-CCA2 security for the KEM assuming merely OW-CPA security ...
Daniel J. Bernstein +1 more
core
On the Development and Standardisation of Post-Quantum Cryptography - A Synopsis of the NIST Post-Quantum Cryptography Standardisation Process, its Incentives, and Submissions [PDF]
Due to developments within the field of quantum computers, the need for developing and implementing quantum-resistant cryptographic algorithms has become more urgent.
Legernæs, Maja Worren
core
Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective
The machinery of industrial environments was connected to the Internet years ago with the scope of increasing their performance. However, this change made such environments vulnerable against cyber-attacks that can compromise their correct functioning ...
Crespo, Pedro M. +4 more
core
Quantum-Resilient Cloud Networking: Designing Post-Quantum Secure Communication Protocols For Federated Cloud Environments In 2025 [PDF]
With quantum computing nearing practical implementation in 2025, concerns over the vulnerability of classical cryptographic algorithms in cloud networking have intensified. This research addresses the urgent need for quantum-resilient
Naveen, Kannegundla
core
Efficient Noncommutative KEMs from Twisted Dihedral Group Ring [PDF]
NTRU schemes have been extensively studied as post-quantum proposals within the category of lattice-based constructions. Numerous designs have been introduced with security assumptions based on the NTRU hard problem; some focused on security, and others ...
Aditi Kar Gangopadhyay +3 more
core
NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage [PDF]
NTRU-based structured lattices underpin several standardized post-quantum cryptographic schemes, most notably the Falcon signature algorithms.
Honglin Shao +3 more
core
Sustainable cyber-physical VANETs with AI-driven anomaly detection and energy-efficient multi-criteria routing using machine learning algorithms. [PDF]
Wong WK, Baskar S, Abubeker KM, Ng PK.
europepmc +1 more source
Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption. [PDF]
Astrizi TL, Custódio R.
europepmc +1 more source

