On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography.
Petr JedlickaLukas MalinaTomas GerlichZdenek MartinasekJan HajnyPetr SochaPublished in: ARES (2022)
Keyphrases
- information security
- cryptographic algorithms
- countermeasures
- cryptographic protocols
- smart card
- security issues
- cellular automata
- security requirements
- quantum computation
- public key cryptography
- key exchange
- security analysis
- information systems
- public key
- secret key
- key management
- sensitive data
- user authentication
- security level
- authentication scheme
- diffie hellman
- elliptic curve cryptography
- quantum computing
- channel capacity
- covert channel
- authentication protocol
- provably secure
- logic circuits
- digital signature
- security mechanisms
- encryption scheme
- resource constrained
- lightweight
- distributed systems