[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments
M Vidaković, K Miličević - Algorithms, 2023 - mdpi.com
The continuous development of quantum computing necessitates the development of
quantum-resistant cryptographic algorithms. In response to this demand, the National …
quantum-resistant cryptographic algorithms. In response to this demand, the National …
KEMTLS vs. post-quantum TLS: Performance on embedded systems
R Gonzalez, T Wiggers - … Conference on Security, Privacy, and Applied …, 2022 - Springer
TLS is ubiquitous in modern computer networks. It secures transport for high-end desktops
and low-end embedded devices alike. However, the public key cryptosystems currently used …
and low-end embedded devices alike. However, the public key cryptosystems currently used …
Parallel small polynomial multiplication for dilithium: A faster design and implementation
J Zheng, F He, S Shen, C Xue, Y Zhao - Proceedings of the 38th Annual …, 2022 - dl.acm.org
The lattice-based signature scheme CRYSTALS-Dilithium is one of the two signature
finalists in the third round NIST post-quantum cryptography (PQC) standardization project …
finalists in the third round NIST post-quantum cryptography (PQC) standardization project …
Integrating post-quantum cryptography and blockchain to secure low-cost IoT devices
In the contemporary era, the global proliferation of Internet of Things (IoT) devices exceeds
15 billion, serving functions from wearables to smart grid monitoring. These devices …
15 billion, serving functions from wearables to smart grid monitoring. These devices …
Quantum-resistant software update security on low-power networked embedded devices
Abstract As the Internet of Things (IoT) rolls out today to devices whose lifetime may well
exceed a decade, conservative threat models should consider adversaries with access to …
exceed a decade, conservative threat models should consider adversaries with access to …
On the state of post-quantum cryptography migration
N Alnahawi, A Wiesmaier, T Grasmeyer, J Geißler… - 2021 - dl.gi.de
Safeguarding current and future IT security from quantum computers implies more than the
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …
Post-quantum impacts on V2X certificates–already at the end of the road
The current certificate definition for vehicle-to-everything (V2X) communication does not
support forward compatibility as it does not take migration toward Post Quantum …
support forward compatibility as it does not take migration toward Post Quantum …
Enabling Lattice-Based Post-Quantum Cryptography on the OpenTitan Platform
The first generation of post-quantum cryptography (PQC) standards by the National Institute
of Standards and Technology (NIST) is just around the corner. The need for secure …
of Standards and Technology (NIST) is just around the corner. The need for secure …
Evaluation of hardware and software implementations for NIST finalist and fourth-round post-quantum cryptography KEMs
Quantum computer attacks could easily jeopardize the total security of currently employed
encryption systems. As a result, there is an ongoing collaborative effort to design post …
encryption systems. As a result, there is an ongoing collaborative effort to design post …