IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
A survey and comparison of post-quantum and quantum blockchains
Blockchains have gained substantial attention from academia and industry for their ability to
facilitate decentralized trust and communications. However, the rapid progress of quantum …
facilitate decentralized trust and communications. However, the rapid progress of quantum …
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …
Masking kyber: First-and higher-order implementations
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …
been extended to include the side-channel resistance of the candidates. While some …
Breaking a fifth-order masked implementation of crystals-kyber by copy-paste
CRYSTALS-Kyber has been selected by the NIST as a public-key encryption and key
encapsulation mechanism to be standardized. It is also included in the NSA's suite of …
encapsulation mechanism to be standardized. It is also included in the NSA's suite of …
RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a
challenging task. PQC introduces new mathematical elements and operations which are …
challenging task. PQC introduces new mathematical elements and operations which are …
Quantum analysis of AES
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …
fully functional quantum computer is still in the future, there is an ever-growing need to …
Post-quantum TLS without handshake signatures
We present KEMTLS, an alternative to the TLS 1.3 handshake that uses key-encapsulation
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …
LWE with side information: attacks and concrete security estimation
We propose a framework for cryptanalysis of lattice-based schemes, when side information—
in the form of “hints”—about the secret and/or error is available. Our framework generalizes …
in the form of “hints”—about the secret and/or error is available. Our framework generalizes …
Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT/INTT
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …