A survey and comparison of post-quantum and quantum blockchains

Z Yang, H Alfauri, B Farkiani, R Jain… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Blockchains have gained substantial attention from academia and industry for their ability to
facilitate decentralized trust and communications. However, the rapid progress of quantum …

[HTML][HTML] Post-quantum security: Opportunities and challenges

S Li, Y Chen, L Chen, J Liao, C Kuang, K Li, W Liang… - Sensors, 2023 - mdpi.com
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …

Breaking a fifth-order masked implementation of crystals-kyber by copy-paste

E Dubrova, K Ngo, J Gärtner, R Wang - … of the 10th ACM Asia public-key …, 2023 - dl.acm.org
CRYSTALS-Kyber has been selected by the NIST as a public-key encryption and key
encapsulation mechanism to be standardized. It is also included in the NSA's suite of …

CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM

J Bos, L Ducas, E Kiltz, T Lepoint… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Rapid advances in quantum computing, together with the announcement by the National
Institute of Standards and Technology (NIST) to define new standards for digitalsignature …

RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography

T Fritzmann, G Sigl, J Sepúlveda - IACR Transactions on …, 2020 - tches.iacr.org
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a
challenging task. PQC introduces new mathematical elements and operations which are …

Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT/INTT

N Zhang, B Yang, C Chen, S Yin, S Wei… - IACR Transactions on …, 2020 - tosc.iacr.org
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …

Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication

C Mujdei, L Wouters, A Karmakar, A Beckers… - ACM Transactions on …, 2024 - dl.acm.org
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …

Protecting dilithium against leakage: Revisited sensitivity analysis and improved implementations

M Azouaoui, O Bronchain… - IACR …, 2023 - philosophymindscience.org
CRYSTALS-Dilithium has been selected by the NIST as the new standard for post-quantum
digital signatures. In this work, we revisit the side-channel countermeasures of Dilithium in …

High-speed NTT accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium

TH Nguyen, B Kieu-Do-Nguyen, CK Pham… - IEEE …, 2024 - ieeexplore.ieee.org
The efficiency of polynomial multiplication execution majorly impacts the performance of
lattice-based post-quantum cryptosystems. In this research, we propose a high-speed …

Chosen ciphertext k-trace attacks on masked cca2 secure kyber

M Hamburg, J Hermelink, R Primas… - IACR Transactions on …, 2021 - ojs.ub.rub.de
Single-trace attacks are a considerable threat to implementations of classic public-key
schemes, and their implications on newer lattice-based schemes are still not well …