Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …
securing the communication channels of connected Internet of Things (IoT) devices …
Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …
the last years and their use has been suggested for numerous applications due to their …
Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general
We present a much-improved practical protocol, based on the hardness of Module-SIS and
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things
TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …
popular public-key encryption systems. Such systems are essential for today's Internet …
Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs
In this work, we demonstrate generic and practical EM side-channel assisted chosen
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …
Masking kyber: First-and higher-order implementations
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …
been extended to include the side-channel resistance of the candidates. While some …
[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis
M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …
technology and there is a race among countries to get supremacy in quantum technology. It …
RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a
challenging task. PQC introduces new mathematical elements and operations which are …
challenging task. PQC introduces new mathematical elements and operations which are …
Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of kyber
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has
drawn great attention from side-channel analysis researchers in recent years. Despite the …
drawn great attention from side-channel analysis researchers in recent years. Despite the …
High-speed instruction-set coprocessor for lattice-based key encapsulation mechanism: Saber in hardware
In this paper, we present an instruction set coprocessor architecture for lattice-based
cryptography and implement the module lattice-based post-quantum key encapsulation …
cryptography and implement the module lattice-based post-quantum key encapsulation …