A comprehensive survey of v2x cybersecurity mechanisms and future research paths
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …
existing transport systems by enabling increased connectivity and driving autonomy levels …
A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general
V Lyubashevsky, NK Nguyen, M Plançon - Annual International …, 2022 - Springer
We present a much-improved practical protocol, based on the hardness of Module-SIS and
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of kyber
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has
drawn great attention from side-channel analysis researchers in recent years. Despite the …
drawn great attention from side-channel analysis researchers in recent years. Despite the …
A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
Abstract The Fiat-Shamir transform is a technique for combining a hash function and an
identification scheme to produce a digital signature scheme. The resulting scheme is known …
identification scheme to produce a digital signature scheme. The resulting scheme is known …
A Compressed -Protocol Theory for Lattices
We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge
(ZK) with polylog-communication, the first not depending on PCPs. We start from …
(ZK) with polylog-communication, the first not depending on PCPs. We start from …
Post-quantum authentication in TLS 1.3: a performance study
D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …
and security research professionals due to their ability to solve (elliptic curve) discrete …
Revisiting post-quantum fiat-shamir
Abstract The Fiat-Shamir transformation is a useful approach to building non-interactive
arguments (of knowledge) in the random oracle model. Unfortunately, existing proof …
arguments (of knowledge) in the random oracle model. Unfortunately, existing proof …
A side-channel-resistant implementation of SABER
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …
extensive studies on efficiency and theoretical security, but research on their side-channel …