Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…SIKE Round 3 on ARM Cortex-M4 SIKE Round 3 is an optimized implementation of the SIKE protocol specifically designed for low-power microcontrollers. It leverages the unique features of the ARM Cortex-M4 architecture to achieve improved performance and reduced memory footprint [234]. With the smallest public key and ciphertext sizes among NIST candidates, it offers efficient post-quantum secure communication for resource-constrained devices.…”
Section: Sike On Cortex-m4mentioning
confidence: 99%
“…SIKE Round 3 on ARM Cortex-M4 SIKE Round 3 is an optimized implementation of the SIKE protocol specifically designed for low-power microcontrollers. It leverages the unique features of the ARM Cortex-M4 architecture to achieve improved performance and reduced memory footprint [234]. With the smallest public key and ciphertext sizes among NIST candidates, it offers efficient post-quantum secure communication for resource-constrained devices.…”
Section: Sike On Cortex-m4mentioning
confidence: 99%
“…Side-channel analysis (SCA) [82] In order to decrease the amount of unnecessary computational overhead. [84] To expand the stack and insert a new area into the CCM's RAM storage.…”
Section: Medical Imagesmentioning
confidence: 99%
“…The NIST-recommended platform for benchmarking post-quantum secure protocols, the STM32F407VG, was the focus of the author's first implementation of compressed SIKE in [84]. By expanding the stack and adding a new memory region in the CCM RAM, we were able to run compressed SIKEp610 without risking memory corruption.…”
mentioning
confidence: 99%
“…It enables secure key-exchange operations on constrained devices and focuses on efficiency and security in the face of potential quantum attacks. There is a variant of SIKE, known as SIKE Round 3 [57,58], which refers to the third round of the SIKE standardization process. Its aim is to select the most secure and efficient implementations of SIKE for postquantum security.…”
Section: Related Work In Abe and Other Security Schemesmentioning
confidence: 99%