Solving a hard mathematical problem is the security basis of all current cryptographic systems. With the realization of a large scale quantum computer, hard mathematical problems such as integer factorization and discrete logarithmic problems will be easily solved with special algorithms implemented on such a computer. Indeed, only post-quantum cryptosystems which defy quantum attacks will survive in the post-quantum era. Each newly proposed post-quantum cryptosystem has to be scrutinized against all different types of attacks. Attacks can be classified into mathematical cryptanalysis and side channel attacks. In this thesis, we propose secure hardware implementations against side channel attacks for two of the most promising post-quantum a...
International audienceThe NTRU cryptosystem is a fast public key cryptosystem presented in 1996 by H...
The emergence of quantum computer research increasingly poses a threat to currently used asymmetric ...
This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptog...
Shor's quantum algorithm can be used to efficiently solve the integer factorisation problem and the ...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
This paper explores some attacks that someone with a Quantum Computer may be able to perform against...
Post quantum algorithms are being developed to be an answer to cryptography in the event where power...
peer reviewedThe dawning era of quantum computing has initiated various initiatives for the standard...
In the next 10 to 50 years, the quantum computer is expected to be available and quantum computing h...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
International audienceThe fast development of quantum computers represents a risk for secure communi...
Public key cryptography, as deployed on the internet today, stands on shaky ground. For over twent...
The advent of quantum computers and the exponential speed-up of quantum computation will render clas...
Post-quantum cryptography is the field of study and development of cryptographic primitives providin...
Cryptography is one of the basic phenomena of security systems. However, some of the widely used pub...
International audienceThe NTRU cryptosystem is a fast public key cryptosystem presented in 1996 by H...
The emergence of quantum computer research increasingly poses a threat to currently used asymmetric ...
This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptog...
Shor's quantum algorithm can be used to efficiently solve the integer factorisation problem and the ...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
This paper explores some attacks that someone with a Quantum Computer may be able to perform against...
Post quantum algorithms are being developed to be an answer to cryptography in the event where power...
peer reviewedThe dawning era of quantum computing has initiated various initiatives for the standard...
In the next 10 to 50 years, the quantum computer is expected to be available and quantum computing h...
The impending threat of large scale quantum computers to traditional RSA and ECC-based public-key cr...
International audienceThe fast development of quantum computers represents a risk for secure communi...
Public key cryptography, as deployed on the internet today, stands on shaky ground. For over twent...
The advent of quantum computers and the exponential speed-up of quantum computation will render clas...
Post-quantum cryptography is the field of study and development of cryptographic primitives providin...
Cryptography is one of the basic phenomena of security systems. However, some of the widely used pub...
International audienceThe NTRU cryptosystem is a fast public key cryptosystem presented in 1996 by H...
The emergence of quantum computer research increasingly poses a threat to currently used asymmetric ...
This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptog...