You are currently on the new version of our website. Access the old version .

38 Results Found

  • Article
  • Open Access
12 Citations
14,084 Views
13 Pages

Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised. Kyber is a post-qu...

  • Article
  • Open Access
1 Citations
1,781 Views
10 Pages

An Efficient and Low-Cost Design of Modular Reduction for CRYSTALS-Kyber

  • Zhengwu Huang,
  • Sizhe Chen,
  • Pengyue Sun,
  • Ding Deng and
  • Guangfu Sun

After being selected as a standard for Post-Quantum Cryptography Key Encapsulation Mechanisms by NIST, CRYSTALS-Kyber has driven the transformation of the information security field toward new standards. In CRYSTALS-Kyber, modular reduction is crucia...

  • Article
  • Open Access
19 Citations
8,453 Views
10 Pages

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

  • Tuy Tan Nguyen,
  • Sungjae Kim,
  • Yongjun Eom and
  • Hanho Lee

24 May 2022

This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards an...

  • Article
  • Open Access
5 Citations
4,275 Views
16 Pages

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

  • Gyeongju Song,
  • Kyungbae Jang,
  • Siwoo Eum,
  • Minjoo Sim and
  • Hwajeong Seo

16 September 2023

The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC stand...

  • Article
  • Open Access
2,436 Views
20 Pages

Comparative Deep Learning-Based Side-Channel Analysis of an FPGA-Based CRYSTALS-Kyber NTT Accelerator

  • Munkhbaatar Chinbat,
  • Liji Wu,
  • Xiangmin Zhang,
  • Yifan Yang and
  • Man Wei

Deep learning-based side-channel analysis is one of the most effective techniques for extracting and classifying sensitive information from a target device. This paper demonstrates the best-performing deep learning model for the target implementation...

  • Article
  • Open Access
4 Citations
2,530 Views
18 Pages

A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm

  • Muhammad Rashid,
  • Omar S. Sonbul,
  • Sajjad Shaukat Jamal,
  • Amar Y. Jaffar and
  • Azamat Kakhorov

31 December 2024

Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. NTT-based polynomials’ multiplication relies on the computation of forward number theoretic transform (FNTT) and...

  • Article
  • Open Access
1 Citations
3,181 Views
16 Pages

The Number Theoretic Transform (NTT) is a cornerstone for efficient polynomial multiplication, which is fundamental to lattice-based cryptographic algorithms such as CRYSTALS-Kyber—a leading candidate in post-quantum cryptography (PQC). However...

  • Article
  • Open Access
1,350 Views
13 Pages

28 October 2025

Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS&nd...

  • Article
  • Open Access
2,832 Views
17 Pages

High-Throughput Post-Quantum Cryptographic System: CRYSTALS-Kyber with Computational Scheduling and Architecture Optimization

  • Shih-Hsiang Chou,
  • Yu-Hua Yang,
  • Wen-Long Chin,
  • Ci Chen,
  • Cheng-Yu Tsao and
  • Pin-Luen Tung

With the development of a quantum computer in the near future, classical public-key cryptography will face the challenge of being vulnerable to quantum algorithms, such as Shor’s algorithm. As communication technology advances rapidly, a great...

  • Feature Paper
  • Review
  • Open Access
5 Citations
4,637 Views
13 Pages

This paper presents a review of module ring learning with errors-based (MLWE-based) public-key encryption and key-establishment algorithms. In particular, we introduce the preliminaries of public key cryptography, MLWE-based algorithms, and arithmeti...

  • Feature Paper
  • Article
  • Open Access
1,375 Views
22 Pages

9 September 2025

Homomorphic encryption solutions tend to be costly in terms of memory and computational resources, making them difficult to implement. In this paper, we present Kyber AHE, a lightweight additive homomorphic encryption scheme for computing the additio...

  • Article
  • Open Access
2 Citations
2,709 Views
20 Pages

19 July 2025

5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI). However, an adversary equip...

  • Article
  • Open Access
34 Views
23 Pages

Deeply Pipelined NTT Accelerator with Ping-Pong Memory and LUT-Only Barrett Reduction for Post-Quantum Cryptography

  • Omar S. Sonbul,
  • Muhammad Rashid,
  • Muhammad I. Masud,
  • Mohammed Aman and
  • Amar Y. Jaffar

Lattice-based post-quantum cryptography relies on fast polynomial multiplication. The Number-Theoretic Transform (NTT) is the key operation that enables this acceleration. To provide high throughput and low latency while keeping the area overhead sma...

  • Article
  • Open Access
1 Citations
3,670 Views
18 Pages

CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024. The resilience of post-quantum cryptography to side-channel...

  • Article
  • Open Access
19 Citations
5,512 Views
25 Pages

This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD). Modern cryptography faces significant threats from quantum computers, which ca...

  • Article
  • Open Access
1,193 Views
19 Pages

4 August 2025

The advent of quantum computing poses an existential threat to the security of cloud services that handle sensitive visual data. Simultaneously, the need for computational privacy requires the ability to process data without exposing it to the cloud...

  • Article
  • Open Access
3 Citations
3,823 Views
15 Pages

Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme

  • Binh Kieu-Do-Nguyen,
  • Nguyen The Binh,
  • Cuong Pham-Quoc,
  • Huynh Phuc Nghi,
  • Ngoc-Thinh Tran,
  • Trong-Thuc Hoang and
  • Cong-Kha Pham

11 July 2024

In the modern era of the Internet of Things (IoT), especially with the rapid development of quantum computers, the implementation of postquantum cryptography algorithms in numerous terminals allows them to defend against potential future quantum atta...

  • Article
  • Open Access
9 Citations
11,789 Views
27 Pages

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

  • Maryam Abbasi,
  • Filipe Cardoso,
  • Paulo Váz,
  • José Silva and
  • Pedro Martins

The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). Thi...

  • Article
  • Open Access
1 Citations
1,123 Views
28 Pages

Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes. While the former has been standardized by the Nat...

  • Article
  • Open Access
19 Citations
6,053 Views
17 Pages

The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT h...

  • Review
  • Open Access
53 Citations
13,462 Views
26 Pages

Post-Quantum Security: Opportunities and Challenges

  • Silong Li,
  • Yuxiang Chen,
  • Lin Chen,
  • Jing Liao,
  • Chanchan Kuang,
  • Kuanching Li,
  • Wei Liang and
  • Naixue Xiong

26 October 2023

Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everyt...

  • Article
  • Open Access
10 Citations
5,825 Views
22 Pages

An Applied Analysis of Securing 5G/6G Core Networks with Post-Quantum Key Encapsulation Methods

  • Paul Scalise,
  • Robert Garcia,
  • Matthew Boeding,
  • Michael Hempel and
  • Hamid Sharif

30 October 2024

Fifth Generation (5G) cellular networks have been adopted worldwide since the rollout began around 2019. It brought with it many innovations and new services, such as Enhanced Mobile Broadband (eMBB), Ultra Reliable and Low-Latency Communications (UR...

  • Systematic Review
  • Open Access
1,362 Views
16 Pages

2 December 2025

The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud...

  • Article
  • Open Access
4 Citations
5,046 Views
11 Pages

In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance. Computers nowadays use encryption methods based on arithmetic operations to turn messages into cipher...

  • Proceeding Paper
  • Open Access
1,431 Views
7 Pages

As medical technology develops and digital demands grow, personal health records (PHRs) are becoming more patient-centered than before based on cloud-based health information exchanges. While enhancing data accessibility and sharing, these systems pr...

  • Article
  • Open Access
1,119 Views
31 Pages

Length–Weight Distribution of Non-Zero Elements in Randomized Bit Sequences

  • Christoph Lange,
  • Andreas Ahrens,
  • Yadu Krishnan Krishnakumar and
  • Olaf Grote

19 June 2025

Randomness plays an important role in data communication as well as in cybersecurity. In the simulation of communication systems, randomized bit sequences are often used to model a digital source information stream. Cryptographic outputs should look...

  • Article
  • Open Access
10 Citations
11,303 Views
33 Pages

A Mathematical Perspective on Post-Quantum Cryptography

  • Maximilian Richter,
  • Magdalena Bertram,
  • Jasper Seidensticker and
  • Alexander Tschache

25 July 2022

In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography. This study presents a detailed, mathematically oriente...

  • Review
  • Open Access
25 Citations
22,992 Views
23 Pages

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

  • Kanza Cherkaoui Dekkaki,
  • Igor Tasic and
  • Maria-Dolores Cano

As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehens...

  • Article
  • Open Access
2,320 Views
24 Pages

The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS). As conventional...

  • Article
  • Open Access
11 Citations
2,406 Views
7 Pages

Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network

  • Min Wang,
  • Wei Zhang,
  • Jianxing Guo,
  • Xiaotian Song and
  • Guilu Long

16 November 2023

Quantum secure direct communication (QSDC) offers a practical way to realize a quantum network which can transmit information securely and reliably. Practical quantum networks are hindered by the unavailability of quantum relays. To overcome this lim...

  • Article
  • Open Access
4 Citations
4,366 Views
13 Pages

Post-Quantum KEMs for IoT: A Study of Kyber and NTRU

  • M. Awais Ehsan,
  • Walaa Alayed,
  • Amad Ur Rehman,
  • Waqar ul Hassan and
  • Ahmed Zeeshan

5 June 2025

Current improvements in quantum computing present a substantial challenge to classical cryptographic systems, which typically rely on problems that can be solved in polynomial time using quantum algorithms. Consequently, post-quantum cryptography (PQ...

  • Article
  • Open Access
13 Citations
4,701 Views
19 Pages

Post-Quantum Authentication in the MQTT Protocol

  • Juliet Samandari and
  • Clémentine Gritti

Message Queue Telemetry Transport (MQTT) is a common communication protocol used in the Internet of Things (IoT). MQTT is a simple, lightweight messaging protocol used to establish communication between multiple devices relying on the publish–s...

  • Article
  • Open Access
2 Citations
2,395 Views
18 Pages

24 May 2025

By aggregating intelligence on emerging threats, attack techniques, and vulnerabilities, organizations can establish a more comprehensive threat landscape awareness and proactively identify potential risks. However, in the process of sharing threat i...

  • Article
  • Open Access
20 Citations
8,902 Views
17 Pages

Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (...

  • Review
  • Open Access
55 Views
37 Pages

The imminent threat of large-scale quantum computers to modern public-key cryptographic devices has led to extensive research into post-quantum cryptography (PQC). Lattice-based schemes have proven to be the top candidate among existing PQC schemes d...

  • Article
  • Open Access
9 Citations
3,314 Views
15 Pages

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

  • Yajing Chang,
  • Yingjian Yan,
  • Chunsheng Zhu and
  • Pengfei Guo

18 October 2022

The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography. Based on the leakage mechanism in the decapsulation stage of LWE/LWR-based post-quantum crypto...

  • Article
  • Open Access
2 Citations
1,860 Views
33 Pages

29 October 2024

The RSA cryptosystem has been a cornerstone of modern public key infrastructure; however, recent advancements in quantum computing and theoretical mathematics pose significant risks to its security. The advent of fully operational quantum computers c...

  • Article
  • Open Access
1,541 Views
36 Pages

27 September 2025

The burgeoning Internet of Medical Things (IoMT) offers unprecedented opportunities for real-time patient monitoring and predictive diagnostics, yet the current systems struggle with scalability, data confidentiality against quantum threats, and real...