A comprehensive survey of v2x cybersecurity mechanisms and future research paths

R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …

A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard

J Kaur, AC Canto, MM Kermani… - arXiv preprint arXiv …, 2023 - arxiv.org
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general

V Lyubashevsky, NK Nguyen, M Plançon - Annual International …, 2022 - Springer
We present a much-improved practical protocol, based on the hardness of Module-SIS and
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …

Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of kyber

Z Xu, O Pemberton, SS Roy, D Oswald… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has
drawn great attention from side-channel analysis researchers in recent years. Despite the …

A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model

E Kiltz, V Lyubashevsky, C Schaffner - … on the Theory and Applications of …, 2018 - Springer
Abstract The Fiat-Shamir transform is a technique for combining a hash function and an
identification scheme to produce a digital signature scheme. The resulting scheme is known …

A Compressed -Protocol Theory for Lattices

T Attema, R Cramer, L Kohl - Annual International Cryptology Conference, 2021 - Springer
We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge
(ZK) with polylog-communication, the first not depending on PCPs. We start from …

Post-quantum authentication in TLS 1.3: a performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

Revisiting post-quantum fiat-shamir

Q Liu, M Zhandry - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
Abstract The Fiat-Shamir transformation is a useful approach to building non-interactive
arguments (of knowledge) in the random oracle model. Unfortunately, existing proof …

A side-channel-resistant implementation of SABER

MV Beirendonck, JP D'anvers, A Karmakar… - ACM Journal on …, 2021 - dl.acm.org
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …