Post-quantum security: Opportunities and challenges
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …
also for information integrity verification, non-repudiation, authentication, and other aspects …
A transformative shift toward blockchain‐based IoT environments: Consensus, smart contracts, and future directions
Abstract Recently, Internet‐of‐Things (IoT) based applications have shifted from centralized
infrastructures to decentralized ecosystems, owing to user data's security and privacy …
infrastructures to decentralized ecosystems, owing to user data's security and privacy …
High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography
This paper demonstrates an architecture for accelerating the polynomial multiplication using
number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …
number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …
Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4
The Supersingular Isogeny Key Encapsulation mechanism (SIKE) is the only post-quantum
key encapsulation protocol based on elliptic curves and isogeny maps between them …
key encapsulation protocol based on elliptic curves and isogeny maps between them …
[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis
M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …
technology and there is a race among countries to get supremacy in quantum technology. It …
Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …
energy consumption, and bandwidth requirements, making it the most preferred public key …
Faster NTRU on ARM cortex-M4 with TMVP-based multiplication
This paper focuses on speeding up NTRU-one of the lattice-based finalists of the NIST PQC
competition-by improving the ring multiplication. The Number Theoretic Transform (NTT) …
competition-by improving the ring multiplication. The Number Theoretic Transform (NTT) …
LELBC: A low energy lightweight block cipher for smart agriculture
Q Song, L Li, X Huang - Internet of Things, 2024 - Elsevier
The massive collection and transmission of various crop and livestock data in smart
agriculture leads to serious security concerns. Furthermore, many Internet of Things (IoT) …
agriculture leads to serious security concerns. Furthermore, many Internet of Things (IoT) …
Curve448 on 32-bit ARM Cortex-M4
Public key cryptography is widely used in key exchange and digital signature protocols.
Public key cryptography requires expensive primitive operations, such as finite-field and …
Public key cryptography requires expensive primitive operations, such as finite-field and …
Time-optimal design of finite field arithmetic for sike on cortex-m4
The advances in quantum technologies and the fast move toward quantum computing are
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …