[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments

M Vidaković, K Miličević - Algorithms, 2023 - mdpi.com
The continuous development of quantum computing necessitates the development of
quantum-resistant cryptographic algorithms. In response to this demand, the National …

KEMTLS vs. post-quantum TLS: Performance on embedded systems

R Gonzalez, T Wiggers - … Conference on Security, Privacy, and Applied …, 2022 - Springer
TLS is ubiquitous in modern computer networks. It secures transport for high-end desktops
and low-end embedded devices alike. However, the public key cryptosystems currently used …

Parallel small polynomial multiplication for dilithium: A faster design and implementation

J Zheng, F He, S Shen, C Xue, Y Zhao - Proceedings of the 38th Annual …, 2022 - dl.acm.org
The lattice-based signature scheme CRYSTALS-Dilithium is one of the two signature
finalists in the third round NIST post-quantum cryptography (PQC) standardization project …

Integrating post-quantum cryptography and blockchain to secure low-cost IoT devices

A Castiglione, JG Esposito, V Loia… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
In the contemporary era, the global proliferation of Internet of Things (IoT) devices exceeds
15 billion, serving functions from wearables to smart grid monitoring. These devices …

Quantum-resistant software update security on low-power networked embedded devices

G Banegas, K Zandberg, E Baccelli… - … Conference on Applied …, 2022 - Springer
Abstract As the Internet of Things (IoT) rolls out today to devices whose lifetime may well
exceed a decade, conservative threat models should consider adversaries with access to …

On the state of post-quantum cryptography migration

N Alnahawi, A Wiesmaier, T Grasmeyer, J Geißler… - 2021 - dl.gi.de
Safeguarding current and future IT security from quantum computers implies more than the
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …

Post-quantum impacts on V2X certificates–already at the end of the road

T Yoshizawa, B Preneel - 2023 IEEE 97th Vehicular …, 2023 - ieeexplore.ieee.org
The current certificate definition for vehicle-to-everything (V2X) communication does not
support forward compatibility as it does not take migration toward Post Quantum …

Enabling Lattice-Based Post-Quantum Cryptography on the OpenTitan Platform

T Stelzer, F Oberhansl, J Schupp, P Karl - Proceedings of the 2023 …, 2023 - dl.acm.org
The first generation of post-quantum cryptography (PQC) standards by the National Institute
of Standards and Technology (NIST) is just around the corner. The need for secure …

Evaluation of hardware and software implementations for NIST finalist and fourth-round post-quantum cryptography KEMs

M Bandaru, SE Mathe, C Wattanapanich - Computers and Electrical …, 2024 - Elsevier
Quantum computer attacks could easily jeopardize the total security of currently employed
encryption systems. As a result, there is an ongoing collaborative effort to design post …