Conference paper Open Access

Efficient and Secured Implementation of PostQuantum Cryptography

Pöppelmann, T.


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/4fee1d9f-e75d-48ec-9cfd-2b39d67d1057/31-Efficient-Secured-Implementation-Post-Quantum-Cryptography.pdf"
      }, 
      "checksum": "md5:cdecd7222c1429c2a06013daa4742346", 
      "bucket": "4fee1d9f-e75d-48ec-9cfd-2b39d67d1057", 
      "key": "31-Efficient-Secured-Implementation-Post-Quantum-Cryptography.pdf", 
      "type": "pdf", 
      "size": 350116
    }
  ], 
  "owners": [
    41483
  ], 
  "doi": "10.5281/zenodo.3952200", 
  "stats": {
    "version_unique_downloads": 40.0, 
    "unique_views": 43.0, 
    "views": 45.0, 
    "version_views": 45.0, 
    "unique_downloads": 40.0, 
    "version_unique_views": 43.0, 
    "volume": 15405104.0, 
    "version_downloads": 44.0, 
    "downloads": 44.0, 
    "version_volume": 15405104.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3952200", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3952199", 
    "bucket": "https://zenodo.org/api/files/4fee1d9f-e75d-48ec-9cfd-2b39d67d1057", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3952199.svg", 
    "html": "https://zenodo.org/record/3952200", 
    "latest_html": "https://zenodo.org/record/3952200", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3952200.svg", 
    "latest": "https://zenodo.org/api/records/3952200"
  }, 
  "conceptdoi": "10.5281/zenodo.3952199", 
  "created": "2020-07-22T11:19:49.748895+00:00", 
  "updated": "2020-07-22T12:59:22.716329+00:00", 
  "conceptrecid": "3952199", 
  "revision": 2, 
  "id": 3952200, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3952200", 
    "description": "<p>Due to their computing power, quantum computers may have the disruptive potential to break various currently used encryption and authentication algorithms within the next 15 to 20 years. Once available, quantum computers would threaten currently used asymmetric algorithms such as RSA and elliptic curve cryptography (ECC). An approach that aims to replace RSA and ECC in next generation security protocols is post-quantum cryptography (PQC). In this work, we show the challenges of implementing PQC on embedded devices and smart cards. One important aspect is the protection of schemes against attacks like power analysis and fault injection and research on this topic is still at a very early stage. Moreover, we describe how existing cryptographic hardware on smart cards or embedded microcontrollers can be used to accelerate post-quantum cryptography.</p>", 
    "language": "eng", 
    "title": "Efficient and Secured Implementation of PostQuantum Cryptography", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3952199"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3952200"
          }
        }
      ]
    }, 
    "communities": [
      {
        "id": "futuretpm-h2020"
      }
    ], 
    "grants": [
      {
        "code": "779391", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::779391"
        }, 
        "title": "Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module", 
        "acronym": "FutureTPM", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "keywords": [
      "Post-Quantum Cryptography", 
      "Smart Card", 
      "Side Channels"
    ], 
    "publication_date": "2020-07-20", 
    "creators": [
      {
        "affiliation": "Infineon Technologies AG", 
        "name": "P\u00f6ppelmann, T."
      }
    ], 
    "meeting": {
      "dates": "February 25 - 27, 2020", 
      "place": "Nuremberg, Germany", 
      "title": "Embedded World Conference 2020"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }, 
    "related_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3952199", 
        "relation": "isVersionOf"
      }
    ]
  }
}
45
44
views
downloads
All versions This version
Views 4545
Downloads 4444
Data volume 15.4 MB15.4 MB
Unique views 4343
Unique downloads 4040

Share

Cite as