Post quantum cryptography (pqc)-an overview

M Kumar, P Pattnaik - 2020 IEEE High Performance Extreme …, 2020 - ieeexplore.ieee.org
We discuss the Post Quantum Cryptography algorithms for key establishment under
consideration by NIST for standardization. Three of these, Crystals-Kyber, Classic McEliece …

Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH

E Crockett, C Paquin, D Stebila - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Once algorithms for quantum-resistant key exchange and digital signature schemes are
selected by standards bodies, adoption of post-quantum cryptography will depend on …

Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography

JF Biasse, X Bonnetain, E Kirshanova… - IET Information …, 2023 - Wiley Online Library
In this survey, the authors review the main quantum algorithms for solving the computational
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

V Chamola, A Jolfaei, V Chanana, P Parashari… - Computer …, 2021 - Elsevier
Quantum computing is an emerging field that uses the concepts of quantum mechanics to
outperform classical computers. Quantum computing finds plethora of applications in the 5G …

Fast constant-time gcd computation and modular inversion

DJ Bernstein, BY Yang - IACR Transactions on Cryptographic …, 2019 - tches.iacr.org
This paper introduces streamlined constant-time variants of Euclid's algorithm, both for
polynomial inputs and for integer inputs. As concrete applications, this paper saves time in …

Post-quantum wireguard

A Hülsing, KC Ning, P Schwabe… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In this paper we present PQ-WireGuard, a post-quantum variant of the handshake in the
WireGuard VPN protocol (NDSS 2017). Unlike most previous work on post-quantum security …

Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols

C Cremers, A Dax, N Medinger - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Key Encapsulation Mechanisms (KEMs) are a critical building block for hybrid encryption
and modern security protocols, notably in the post-quantum setting. Given the asymmetric …

CRC-oriented error detection architectures of post-quantum cryptography niederreiter key generator on FPGA

A Cintas-Canto, M Mozaffari-Kermani… - 2022 IEEE Nordic …, 2022 - ieeexplore.ieee.org
Providing error detection constructions for Internet of nano-Things in constrained
applications is of prominent importance. The Niederreiter cryptosystem falls into the category …

Secure IoT in the era of quantum computers—Where are the bottlenecks?

M Schöffel, F Lauer, CC Rheinländer, N Wehn - Sensors, 2022 - mdpi.com
Recent progress in quantum computers severely endangers the security of widely used
public-key cryptosystems and of all communication that relies on it. Thus, the US NIST is …

SIKE'd up: Fast hardware architectures for supersingular isogeny key encapsulation

B Koziel, AB Ackie, R El Khatib… - … on Circuits and …, 2020 - ieeexplore.ieee.org
In this work, we present a fast parallel architecture to perform supersingular isogeny key
encapsulation (SIKE). We propose and implement a fast isogeny accelerator architecture …