2018
DOI: 10.1155/2018/9846168
|View full text |Cite
|
Sign up to set email alerts
|

Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms

Abstract: Quantum computers have the potential to solve some difficult mathematical problems efficiently and thus will inevitably exert a more significant impact on the traditional asymmetric cryptography. The National Institute of Standards and Technology (NIST) has opened a formal call for the submission of proposals of quantum-resistant public-key cryptographic algorithms to set the next-generation cryptography standards. Compared to powerful machines with ample amount of hardware resources such as racks of servers a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…This encryption method is entirely open source (Yuan et al, 2018) and is grounded in modern technology (Güneysu et al, 2012). There is no requirement for a hardware update and therefore overhead cost is minimised.…”
Section: Industry's Examplementioning
confidence: 99%
“…This encryption method is entirely open source (Yuan et al, 2018) and is grounded in modern technology (Güneysu et al, 2012). There is no requirement for a hardware update and therefore overhead cost is minimised.…”
Section: Industry's Examplementioning
confidence: 99%
“…In this section, we have discussed the hardware implementation of LW-LBC on different computational platforms [137]. Many lattice systems originally require large matrices to be stored over integer rings and are very inefficient in both run-time and storage space.…”
Section: Hardware Implementation Of Lightweight Lattice-based Cryptogmentioning
confidence: 99%
“…The principle of replacing matrices with polynomials in integer rings over ideals enables both to be minimized. Therefore, in very effective structures, the substitution of lattices with perfect lattices occurs [136,137]. It is recommended that, for IoT devices (based on communication technologies, such as IEEE 802.11ah, 802.15.4, low-power Wi-Fi, BLE, Lo-Rawan, Sigfox, NB-IoT, etc.…”
Section: Hardware Implementation Of Lightweight Lattice-based Cryptogmentioning
confidence: 99%