[HTML][HTML] Post-quantum security: Opportunities and challenges

S Li, Y Chen, L Chen, J Liao, C Kuang, K Li, W Liang… - Sensors, 2023 - mdpi.com
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …

Future-proofing genomic data and consent management: a comprehensive review of technology innovations

A Oliva, A Kaphle, R Reguant, LMF Sng… - …, 2024 - academic.oup.com
Genomic information is increasingly used to inform medical treatments and manage future
disease risks. However, any personal and societal gains must be carefully balanced against …

Exploiting intermediate value leakage in dilithium: a template-based approach

A Berzati, AC Viera, M Chartouny, S Madec… - IACR Transactions on …, 2023 - hal.science
This paper presents a new profiling side-channel attack on CRYSTALS-Dilithium, the new
NIST primary standard for quantum-safe digital signatures. An open-source implementation …

A hardware-software co-design for the discrete gaussian sampling of falcon digital signature

E Karabulut, A Aysu - … on Hardware Oriented Security and Trust …, 2024 - ieeexplore.ieee.org
Sampling random values from a discrete Gaussian distribution with high precision is a major
and computationally-intensive operation of emerging and existing cryptographic standards …

Falcon takes off-a hardware implementation of the falcon signature scheme

M Schmid, D Amiet, J Wendler, P Zbinden… - Cryptology ePrint …, 2023 - eprint.iacr.org
Falcon is one out of three post-quantum signature schemes which have been selected for
standardization by NIST in July 2022. To the best of our knowledge, Falcon is the only …

Advancing the Security of LDACS

N Mäurer, T Gräupl, C Schmitt… - … on Network and …, 2022 - ieeexplore.ieee.org
The “Single European Sky” air traffic management master plan foresees the introduction of
several modern digital data links for aeronautical communications. The candidate for long …

[HTML][HTML] Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles

DS Amirkhanova, M Iavich, O Mamyrbayev - Cryptography, 2024 - mdpi.com
Modern technologies like quantum and cloud computing have reshaped computing, offering
immense power and scalability. While beneficial, they also challenge the security of …

A secure cell-attachment procedure of LDACS

N Mäurer, T Gräupl, C Gentsch… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
In Europe the Single European Sky air traffic management master plan foresees the
introduction of several modern digital data links for aeronautical communications. The …

Improving bitcoin's post-quantum transaction efficiency with a novel lattice-based aggregate signature scheme based on CRYSTALS-dilithium and a STARK protocol

Y Quan - IEEE Access, 2022 - ieeexplore.ieee.org
This paper proposes a novel lattice-based aggregate signature (LAS) scheme that brings
post-quantum security to the Bitcoin system without sacrificing its transaction efficiency …

Experimental perspectives of post and pre quantum cryptographic algorithm for cyber physical systems in IoT

A Sarkar, M Jhamb - 2023 10th IEEE Uttar Pradesh Section …, 2023 - ieeexplore.ieee.org
In the realm of data indemnity and cryptography, the evolution of cryptographic algorithms
has been profound, reflecting the eternal battle between encryption techniques and …