publication . Conference object . Article . 2020

Efficient and Secured Implementation of PostQuantum Cryptography

Pöppelmann; T.;
Open Access English
  • Published: 20 Jul 2020
  • Publisher: Zenodo
Due to their computing power, quantum computers may have the disruptive potential to break various currently used encryption and authentication algorithms within the next 15 to 20 years. Once available, quantum computers would threaten currently used asymmetric algorithms such as RSA and elliptic curve cryptography (ECC). An approach that aims to replace RSA and ECC in next generation security protocols is post-quantum cryptography (PQC). In this work, we show the challenges of implementing PQC on embedded devices and smart cards. One important aspect is the protection of schemes against attacks like power analysis and fault injection and research on this topic ...
ACM Computing Classification System: Hardware_ARITHMETICANDLOGICSTRUCTURES
free text keywords: Post-Quantum Cryptography, Smart Card, Side Channels, Post-Quantum Cryptography, Smart Card, Side Channels
Funded by
EC| FutureTPM
Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module
  • Funder: European Commission (EC)
  • Project Code: 779391
  • Funding stream: H2020 | RIA
Validated by funder
Download fromView all 4 versions
Open Access
Conference object . 2020
Provider: ZENODO
Open Access
Conference object . 2020
Provider: Datacite
Any information missing or wrong?Report an Issue