Results 41 to 50 of about 130 (55)

A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs [PDF]

open access: yes, 2021
The research on the key mismatch attacks against the lattice-based KEMs is an important part of the cryptographic assessment of the ongoing NIST standardization. There have been a number of these attacks. However, a unified method to evaluate these KEMs\
Chi Cheng   +5 more
core  

DAWN: Smaller and Faster NTRU Encryption via Double Encoding [PDF]

open access: yes
This paper introduces DAWN, a compact and efficient NTRU encryption utilizing double encoding, which is provably secure under the NTRU assumption and the Ring-LWE assumption.
Xianhui Lu   +4 more
core  

Towards KEM Unification [PDF]

open access: yes, 2018
This paper highlights a particular construction of a correct KEM without failures and without ciphertext expansion from any correct deterministic PKE, and presents a simple tight proof of ROM IND-CCA2 security for the KEM assuming merely OW-CPA security ...
Daniel J. Bernstein   +1 more
core  

On the Development and Standardisation of Post-Quantum Cryptography - A Synopsis of the NIST Post-Quantum Cryptography Standardisation Process, its Incentives, and Submissions [PDF]

open access: yes, 2018
Due to developments within the field of quantum computers, the need for developing and implementing quantum-resistant cryptographic algorithms has become more urgent.
Legernæs, Maja Worren
core  

Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective

open access: yes
The machinery of industrial environments was connected to the Internet years ago with the scope of increasing their performance. However, this change made such environments vulnerable against cyber-attacks that can compromise their correct functioning ...
Crespo, Pedro M.   +4 more
core  

Quantum-Resilient Cloud Networking: Designing Post-Quantum Secure Communication Protocols For Federated Cloud Environments In 2025 [PDF]

open access: yes
With quantum computing nearing practical implementation in 2025, concerns over the vulnerability of classical cryptographic algorithms in cloud networking have intensified. This research addresses the urgent need for quantum-resilient
Naveen, Kannegundla
core  

Efficient Noncommutative KEMs from Twisted Dihedral Group Ring [PDF]

open access: yes
NTRU schemes have been extensively studied as post-quantum proposals within the category of lattice-based constructions. Numerous designs have been introduced with security assumptions based on the NTRU hard problem; some focused on security, and others ...
Aditi Kar Gangopadhyay   +3 more
core  

NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage [PDF]

open access: yes
NTRU-based structured lattices underpin several standardized post-quantum cryptographic schemes, most notably the Falcon signature algorithms.
Honglin Shao   +3 more
core  

Home - About - Disclaimer - Privacy