Showing 1 - 20 results of 26 for search '"post-quantum cryptography"', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Accelerating Post-Quantum Cryptography using an Energy-Efficient TLS Crypto-Processor by Banerjee, Utsav, Das, Siddharth, Chandrakasan, Anantha P

    Published 2020
    “…Post-quantum cryptography (PQC) is currently a growing area of research and NIST PQC Round 2 schemes are being actively analyzed and optimized for both security and efficiency. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Developing secure, ultra-low power RISC processor by Ang, Kai Jun

    Published 2023
    “…This project aims to develop a hybrid implementation of the firmware over-the-air update process, incorporating both classical and post-quantum cryptography. The project was successful in developing a hybrid implementation that is able to verify digital signatures from both a classical and a post quantum cryptography algorithm. …”
    Get full text
    Final Year Project (FYP)
  10. 10

    Evaluating software packages for attacks against elliptic curve cryptography by Moore, N

    Published 2016
    “…Until the coming of quantum computers and post-quantum cryptography, elliptic curve cryptography seems to be a prime candidate for modern encryption systems. …”
    Report
  11. 11

    Novel forgery mechanisms in multivariate signature schemes by Abdul Jamal, Nurul Amiera Sakinah, Kamel Ariffin, Muhammad Rezal, Abdullah, Kamilah

    Published 2023
    “…Multivariate cryptography is listed among the promising candidates for post-quantum cryptography primitives. Its hard problem depends on the difficulty of solving m multivariate quadratic equations in n variables over a finite field, hence the name Multivariate Quadratic Problem (MQP). …”
    Article
  12. 12

    New and improved zero-knowledge argument systems for code-based cryptography by Tang, Khai Hanh

    Published 2022
    “…To this end, NIST proposed Post-Quantum Cryptography Standardization process to solicit, evaluate, and standardize quantum-resistant cryptographic algorithms. …”
    Get full text
    Thesis-Doctor of Philosophy
  13. 13

    Verifying Correctness of the Number Theoretic Transform and Fast Number Theoretic Transform in F⋆ by Ono, Rick R.

    Published 2024
    “…The Number Theoretic Transform (NTT) is an algorithm that enables efficient polynomial multiplication and has recently gained importance in post-quantum cryptography. This thesis presents a proof of correctness of the NTT in F⋆ , a proof-oriented programming language that extracts to OCaml, and shows that we can use the NTT to perform polynomial multiplications. …”
    Get full text
    Thesis
  14. 14

    On the Security of Supersingular Isogeny Cryptosystems by Galbraith, S, Petit, C, Shani, B, Ti, Y

    Published 2016
    “…This is an active area of research in post-quantum cryptography. Our first contribution is to give a very powerful active attack on the supersingular isogeny encryption scheme. …”
    Conference item
  15. 15

    The do's and don'ts of quantum memory in cryptanalysis by Jaques, S

    Published 2023
    “…This algorithm can attack “CSIDH”, a type of post-quantum cryptography. Again QRAM is an effective tool: huge classical co-processing costs offset the expense of each quantum memory access. …”
    Thesis
  16. 16

    Lattice-based cryptography: the dots that provide information security by Arif Mandangan, Hailiza Kamarulhaili, Muhammad Asyraf Asbullah, Che Haziqah Che Hussin

    Published 2023
    “…Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. …”
    Get full text
    Get full text
    Proceedings
  17. 17

    Efficient Algorithms, Protocols and Hardware Architectures for Next-Generation Cryptography in Embedded Systems by Banerjee, Utsav

    Published 2022
    “…Using circuit, architecture and algorithm techniques, efficient hardware-accelerated implementations of elliptic curve cryptography, pairing-based cryptography, lattice-based cryptography and other post-quantum cryptography algorithms are demonstrated with up to two orders of magnitude energy savings compared to state-of-the-art software and hardware. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Machine learning and hardware security : challenges and opportunities by Regazzoni, Francesco, Bhasin, Shivam, Pour, Amir Ali, Alshaer, Ihab, Aydin, Furkan, Aysu, Aydin, Beroulle, Vincent, Di Natale, Giorgio, Franzon, Paul, Hely, David, Homma, Naofumi, Ito, Akira, Jap, Dirmanto, Kashyap, Priyank, Polian, Ilia, Potluri, Seetal, Ueno, Rei, Vatajelu, Elena-Ioana, Yli-Mäyry, Ville

    Published 2021
    “…This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. …”
    Get full text
    Journal Article
  19. 19

    On configurable SCA countermeasures against single trace attacks for the NTT by Ravi, Prasanna, Poussier, Romain, Bhasin, Shivam, Chattopadhyay, Anupam

    Published 2021
    “…The Number Theoretic Transform (NTT) is a critical subblock used in several structured lattice-based schemes, including Kyber and Dilithium, which are finalist candidates in the NIST’s standardization process for post-quantum cryptography. The NTT was shown to be susceptible to single trace side-channel attacks by Primas et al. in CHES 2017 and Pessl et al. in Latincrypt 2019 who demonstrated full key recovery from single traces on the ARM Cortex-M4 microcontroller. …”
    Get full text
    Conference Paper
  20. 20

    Review and comparison of US, EU, and UK regulations on cyber risk/security of the current Blockchain Technologies - viewpoint from 2023 by Radanliev, P

    Published 2023
    “…This article starts with a comparison of existing cybersecurity standards and regulations from the National Institute of Standards and Technology (NIST) and the International Organisation for Standardisation (ISO)—ISO27001, followed by a discussion on more specific and recent standards and regulations, such as the Markets in Crypto-Assets Regulation (MiCA), Committee on Payments and Market Infrastructures and the International Organisation of Securities Commissions (CPMI-IOSCO), and more general cryptography (and post-quantum cryptography), in the context of cybersecurity. …”
    Journal article