Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude
Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public-key post-quantum cryptographic primitives that are resistant to the quantum attackers. Among them, there is a large number of post-quantum key encaps...
Main Authors: | Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-IET
2023-01-01
|
Series: | IET Information Security |
Online Access: | http://dx.doi.org/10.1049/2023/9399887 |
Similar Items
-
Modelling and verification of post-quantum key encapsulation mechanisms using Maude
by: Víctor García, et al.
Published: (2023-09-01) -
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol
by: Duong Dinh Tran, et al.
Published: (2024-01-01) -
Password authenticated key exchange-based on Kyber for mobile devices
by: Kübra Seyhan, et al.
Published: (2024-03-01) -
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU
by: Vincent Hwang, et al.
Published: (2022-08-01) -
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU
by: Vincent Hwang, et al.
Published: (2022-08-01)