Evaluation of Performance, Energy, and Computation Costs of Quantum-Attack Resilient Encryption Algorithms for Embedded Devices
The accelerated development of quantum computers poses a direct threat to all current standards of public key encryption, for example, the Shor algorithm exploits the superposition state of the qubits to solve the problem of integer factorization in polynomial time, rendering all systems whose secur...
Main Authors: | Basel Halak, Thomas Gibson, Millicent Henley, Cristin-Bianca Botea, Benjamin Heath, Sayedur Khan |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10382535/ |
Similar Items
-
Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems
by: Eros Camacho-Ruiz, et al.
Published: (2023-06-01) -
Analysis of Atom against quantum attacks
by: Ravi Anand, et al.
Published: (2024-03-01) -
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications
by: Jose-Antonio Septien-Hernandez, et al.
Published: (2022-01-01) -
Device-independent quantum key distribution from computational assumptions
by: Tony Metger, et al.
Published: (2021-01-01) -
On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics
by: Robert Cockell, et al.
Published: (2020-04-01)