Skip to Content

13 Results Found

  • Article
  • Open Access
724 Views
14 Pages

Accelerating Post-Quantum Cryptography: A High-Efficiency NTT for ML-KEM on RISC-V

  • Duc-Thuan Dam,
  • Khai-Duy Nguyen,
  • Duc-Hung Le and
  • Cong-Kha Pham

24 December 2025

Post-quantum cryptography (PQC) is rapidly being standardized, with key primitives such as Key Encapsulation Mechanisms (KEMs) and Digital Signature Algorithms (DSAs) moving into practical applications. While initial research focused on pure software...

  • Article
  • Open Access
5 Citations
3,090 Views
20 Pages

19 July 2025

5G addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI). However, an adversary equip...

  • Article
  • Open Access
1 Citations
466 Views
18 Pages

A High-Throughput, BRAM-Efficient NTT/INTT Accelerator for ML-KEM

  • Xianwei Gao,
  • Yitong Li,
  • Tianyao Li,
  • Xuemei Li and
  • Jianxin Wang

10 December 2025

The Number-Theoretic Transform is the primary performance bottleneck in hardware accelerators for post-quantum cryptography schemes like the Module-Lattice-based Key-Encapsulation Mechanism. A key design challenge is the trade-off between the massive...

  • Review
  • Open Access
3 Citations
7,326 Views
31 Pages

Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements

  • Naya Nagy,
  • Sarah Alnemer,
  • Lama Mohammed Alshuhail,
  • Haifa Alobiad,
  • Tala Almulla,
  • Fatima Ahmed Alrumaihi,
  • Najd Ghadra and
  • Marius Nagy

1 July 2025

Key exchange mechanisms are foundational to secure communication, yet traditional methods face challenges from quantum computing. The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a post-quantum cryptographic key exchange protocol with...

  • Article
  • Open Access
2 Citations
2,751 Views
25 Pages

The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques. The NIST has responded by standardising Post-Quantum Cryptography (PQC) al...

  • Article
  • Open Access
470 Views
22 Pages

Benchmarking Post-Quantum Signatures and KEMs on General-Purpose CPUs Using a TCP Client–Server Testbed

  • Jesus Algar-Fernandez,
  • Andrea Villacís-Vanegas,
  • Ysabel Amaro-Aular and
  • Maria-Dolores Cano

9 February 2026

Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems. Beyond asymptotic security, the feasibility of PQC deployments depends on measured performance on...

  • Article
  • Open Access
3,440 Views
23 Pages

24 December 2025

The emergence of quantum computing threatens the security of classical cryptographic algorithms such as RSA and ECC. Post-quantum cryptography (PQC) offers mathematically secure alternatives, but migration is a complex, multi-year undertaking. Unlike...

  • Article
  • Open Access
1 Citations
3,953 Views
18 Pages

CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024. The resilience of post-quantum cryptography to side-channel...

  • Article
  • Open Access
1 Citations
6,854 Views
16 Pages

Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing sy...

  • Article
  • Open Access
1 Citations
898 Views
26 Pages

QRoNS: Quantum Resilience over IPsec Tunnels for Network Slicing

  • Dimosthenis Iliadis-Apostolidis,
  • Daniel Christian Lawo,
  • Sokol Kosta,
  • Idelfonso Tafur Monroy and
  • Juan Jose Vegas Olmos

29 October 2025

Modern high-performance network infrastructures must address the challenges of scalability and quantum-resistant security, particularly in multi-tenant and virtualized environments. In this work, we introduce a novel implementation of Post-Quantum Cr...

  • Article
  • Open Access
374 Views
18 Pages

10 February 2026

Migrating to Post-Quantum Cryptography (PQC) is critical for securing resource-constrained Internet of Things (IoT) devices against the “harvest-now, decrypt-later” threat. While ML-KEM (CRYSTALS-Kyber) has been standardized under FIPS 20...

  • Systematic Review
  • Open Access
2 Citations
2,036 Views
16 Pages

2 December 2025

The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud...

  • Article
  • Open Access
1 Citations
2,180 Views
15 Pages

Integrating and Benchmarking KpqC in TLS/X.509

  • Minjoo Sim,
  • Gyeongju Song,
  • Siwoo Eum,
  • Minwoo Lee,
  • Seyoung Yoon,
  • Anubhab Baksi and
  • Hwajeong Seo

19 September 2025

Advances in quantum computing pose a fundamental threat to classical public-key cryptosystems, including RSA and elliptic-curve cryptography (ECC), which form the foundation for authentication and key exchange in the Transport Layer Security (TLS) pr...