Conference paper Open Access

Efficient and Secured Implementation of PostQuantum Cryptography

Pöppelmann, T.


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/4fee1d9f-e75d-48ec-9cfd-2b39d67d1057/31-Efficient-Secured-Implementation-Post-Quantum-Cryptography.pdf"
      }, 
      "checksum": "md5:cdecd7222c1429c2a06013daa4742346", 
      "bucket": "4fee1d9f-e75d-48ec-9cfd-2b39d67d1057", 
      "key": "31-Efficient-Secured-Implementation-Post-Quantum-Cryptography.pdf", 
      "type": "pdf", 
      "size": 350116
    }
  ], 
  "owners": [
    41483
  ], 
  "doi": "10.5281/zenodo.3952200", 
  "stats": {
    "version_unique_downloads": 49.0, 
    "unique_views": 54.0, 
    "views": 56.0, 
    "version_views": 56.0, 
    "unique_downloads": 49.0, 
    "version_unique_views": 54.0, 
    "volume": 19256380.0, 
    "version_downloads": 55.0, 
    "downloads": 55.0, 
    "version_volume": 19256380.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3952200", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3952199", 
    "bucket": "https://zenodo.org/api/files/4fee1d9f-e75d-48ec-9cfd-2b39d67d1057", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3952199.svg", 
    "html": "https://zenodo.org/record/3952200", 
    "latest_html": "https://zenodo.org/record/3952200", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3952200.svg", 
    "latest": "https://zenodo.org/api/records/3952200"
  }, 
  "conceptdoi": "10.5281/zenodo.3952199", 
  "created": "2020-07-22T11:19:49.748895+00:00", 
  "updated": "2020-07-22T12:59:22.716329+00:00", 
  "conceptrecid": "3952199", 
  "revision": 2, 
  "id": 3952200, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3952200", 
    "description": "<p>Due to their computing power, quantum computers may have the disruptive potential to break various currently used encryption and authentication algorithms within the next 15 to 20 years. Once available, quantum computers would threaten currently used asymmetric algorithms such as RSA and elliptic curve cryptography (ECC). An approach that aims to replace RSA and ECC in next generation security protocols is post-quantum cryptography (PQC). In this work, we show the challenges of implementing PQC on embedded devices and smart cards. One important aspect is the protection of schemes against attacks like power analysis and fault injection and research on this topic is still at a very early stage. Moreover, we describe how existing cryptographic hardware on smart cards or embedded microcontrollers can be used to accelerate post-quantum cryptography.</p>", 
    "language": "eng", 
    "title": "Efficient and Secured Implementation of PostQuantum Cryptography", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3952199"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3952200"
          }
        }
      ]
    }, 
    "communities": [
      {
        "id": "futuretpm-h2020"
      }
    ], 
    "grants": [
      {
        "code": "779391", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::779391"
        }, 
        "title": "Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module", 
        "acronym": "FutureTPM", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "keywords": [
      "Post-Quantum Cryptography", 
      "Smart Card", 
      "Side Channels"
    ], 
    "publication_date": "2020-07-20", 
    "creators": [
      {
        "affiliation": "Infineon Technologies AG", 
        "name": "P\u00f6ppelmann, T."
      }
    ], 
    "meeting": {
      "dates": "February 25 - 27, 2020", 
      "place": "Nuremberg, Germany", 
      "title": "Embedded World Conference 2020"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }, 
    "related_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3952199", 
        "relation": "isVersionOf"
      }
    ]
  }
}
56
55
views
downloads
All versions This version
Views 5656
Downloads 5555
Data volume 19.3 MB19.3 MB
Unique views 5454
Unique downloads 4949

Share

Cite as