Jan. 13, 2023, 2:10 a.m. | Maximilian Schöffel, Johannes Feldmann, Norbert Wehn

cs.CR updates on arXiv.org arxiv.org

Recent advances in quantum computing pose a serious threat on the security of
widely used public-key cryptosystems. Thus, new post-quantum cryptographic
algorithms have been proposed as part of the associated US NIST process to
enable secure, encrypted communication in the age of quantum computing. Many
hardware accelerators for structured lattice-based algorithms have already been
published to meet the strict power, area and latency requirements of low-power
IoT edge devices. However, the security of these algorithms is still uncertain.
Currently, many …

age algorithms area code communication computing cryptography design devices edge edge devices enable encrypted hardware iot key latency low new post nist post-quantum power process public quantum quantum computing requirements security serious the age threat

Red Team Penetration Tester and Operator, Junior

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)

Director, Security Operations & Risk Management

@ Live Nation Entertainment | Toronto, ON

IT and Security Specialist APAC (F/M/D)

@ Flowdesk | Singapore, Singapore, Singapore

Senior Security Controls Assessor

@ Capgemini | Washington, DC, District of Columbia, United States; McLean, Virginia, United States

GRC Systems Solution Architect

@ Deloitte | Midrand, South Africa

Cybersecurity Subject Matter Expert (SME)

@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States