Efficient implementation of kyber on mobile devices
Kyber, an IND-CCA-secure key encapsulation mechanism (KEM) based on the MLWE
problem, has been shortlisted for the third round evaluation of the NIST Post-Quantum …
problem, has been shortlisted for the third round evaluation of the NIST Post-Quantum …
Post-Quantum Algebraic Cryptography Algorithms Designed and Developed for the Internet of Things Eco-Systems
RNP Rodas - 2022 - search.proquest.com
Polynomial-time attacks designed to run on quantum computers and capable of breaking
traditional cryptographic protocols are already known. Quantum-strong algorithms capable …
traditional cryptographic protocols are already known. Quantum-strong algorithms capable …