Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks
TM Fernandez-Carames, P Fraga-Lamas - IEEE access, 2020 - ieeexplore.ieee.org
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …
the last years and their use has been suggested for numerous applications due to their …
An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT
A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024 - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …
securing the communication channels of connected Internet of Things (IoT) devices …
A modular analysis of the Fujisaki-Okamoto transformation
Abstract The Fujisaki-Okamoto (FO) transformation (CRYPTO 1999 and Journal of
Cryptology 2013) turns any weakly secure public-key encryption scheme into a strongly (ie …
Cryptology 2013) turns any weakly secure public-key encryption scheme into a strongly (ie …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general
V Lyubashevsky, NK Nguyen, M Plançon - Annual International …, 2022 - Springer
We present a much-improved practical protocol, based on the hardness of Module-SIS and
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
[PDF][PDF] CRYSTALS-Kyber algorithm specifications and supporting documentation
• Increase noise parameter for Kyber512 In the round-2 submission of Kyber, the decryption
error for Kyber512 was rather conservative, while at the same time, there were requests to …
error for Kyber512 was rather conservative, while at the same time, there were requests to …
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
In this paper, we introduce Saber, a package of cryptographic primitives whose security
relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first …
relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first …
From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things
TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …
popular public-key encryption systems. Such systems are essential for today's Internet …
Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs
In this work, we demonstrate generic and practical EM side-channel assisted chosen
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …