A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard

J Kaur, AC Canto, MM Kermani… - arXiv preprint arXiv …, 2023 - arxiv.org
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …

A quantum-resistant blockchain system: a comparative analysis

P Thanalakshmi, A Rishikhesh, J Marion Marceline… - Mathematics, 2023 - mdpi.com
Blockchain transactions are decentralized, secure, and transparent, and they have altered
industries. However, the emergence of quantum computing presents a severe security risk to …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Syndrome decoding in the head: Shorter signatures from zero-knowledge proofs

T Feneuil, A Joux, M Rivain - Annual International Cryptology Conference, 2022 - Springer
Zero-knowledge proofs of knowledge are useful tools to design signature schemes. The
ongoing effort to build a quantum computer urges the cryptography community to develop …

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

V Chamola, A Jolfaei, V Chanana, P Parashari… - Computer …, 2021 - Elsevier
Quantum computing is an emerging field that uses the concepts of quantum mechanics to
outperform classical computers. Quantum computing finds plethora of applications in the 5G …

[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis

M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …

Understand-before-talk (UBT): A semantic communication approach to 6G networks

SR Pokhrel, J Choi - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
In Shannon theory, semantic aspects of communication were identified but considered
irrelevant to the technical communication problems. Semantic communication (SC) …

Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature

T Feneuil, A Joux, M Rivain - Designs, Codes and Cryptography, 2023 - Springer
The threat of a coming quantum computer motivates the research for new zero-knowledge
proof techniques for (or based on) post-quantum cryptographic problems. One of the few …

[PDF][PDF] Recommendation for stateful hash-based signature schemes

DA Cooper, DC Apon, QH Dang… - NIST Special …, 2020 - ciphersolutionsblog.com
This recommendation specifies two algorithms that can be used to generate a digital
signature, both of which are stateful hash-based signature schemes: the Leighton-Micali …

Banquet: short and fast signatures from AES

C Baum, CD de Saint Guilhem, D Kales… - … Conference on Public …, 2021 - Springer
This work introduces Banquet, a digital signature scheme with post-quantum security,
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …