The evolution of quantum key distribution networks: On the road to the qinternet

Y Cao, Y Zhao, Q Wang, J Zhang… - … Surveys & Tutorials, 2022‏ - ieeexplore.ieee.org
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …

[HTML][HTML] Futuristic view of the internet of quantum drones: review, challenges and research agenda

A Kumar, DA de Jesus Pacheco, K Kaushik… - Vehicular …, 2022‏ - Elsevier
The disruptive technology of unmanned aerial vehicles (UAVs), or drones, is a trend with
increasing applications and practical relevance in the current and future society. Despite the …

Single-trace attacks on message encoding in lattice-based KEMs

BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han… - IEEE …, 2020‏ - ieeexplore.ieee.org
In this article, we propose single-trace side-channel attacks against lattice-based key
encapsulation mechanisms (KEMs) that are the third-round candidates of the national …

Public blockchains for resource-constrained IoT devices—A state-of-the-art survey

JH Khor, M Sidorov, PY Woon - IEEE Internet of Things Journal, 2021‏ - ieeexplore.ieee.org
Although blockchain offers a lot of benefits for the Internet-of-Things (IoT) network in terms of
security, there are a number of barriers to its widespread adoption. Since many IoT networks …

A blockchain-based containerized edge computing platform for the internet of vehicles

L Cui, Z Chen, S Yang, Z Ming, Q Li… - IEEE Internet of …, 2020‏ - ieeexplore.ieee.org
Edge computing is promising to solve the latency issue in the Internet of Vehicles (IoV).
However, due to decentralization, traditional edge computing suffers in management …

A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices

S Kumari, M Singh, R Singh, H Tewari - Computer Networks, 2022‏ - Elsevier
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …

Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey

S Kumari, M Singh, R Singh… - Software: Practice and …, 2022‏ - Wiley Online Library
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …

Smaug: Pushing lattice-based key encapsulation mechanisms to the limits

JH Cheon, H Choe, D Hong, MJ Yi - International Conference on Selected …, 2023‏ - Springer
Recently, NIST has announced Kyber, a lattice-based key encapsulation mechanism (KEM),
as a post-quantum standard. However, it is not the most efficient scheme among the NIST's …

TiGER: Tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE (R)

S Park, CG Jung, A Park, J Choi, H Kang - Cryptology ePrint Archive, 2022‏ - eprint.iacr.org
Abstract The quantum resistance Key Encapsulation Mechanism (PQC-KEM) design aims to
replace cryptography in legacy security protocols. It would be nice if PQC-KEM were faster …

FACCT: fast, compact, and constant-time discrete Gaussian sampler over integers

RK Zhao, R Steinfeld, A Sakzad - IEEE Transactions on …, 2019‏ - ieeexplore.ieee.org
The discrete Gaussian sampler is one of the fundamental tools in implementing lattice-
based cryptosystems. However, a naive discrete Gaussian sampling implementation suffers …