Publication: Adapted KEM Applications for Post-Quantum Security of Mobile Devices
| dc.authorscopusid | 57984799800 | |
| dc.authorscopusid | 57212212152 | |
| dc.authorscopusid | 15833929800 | |
| dc.contributor.author | Dursun, A.F. | |
| dc.contributor.author | Seyhan, K. | |
| dc.contributor.author | Akleylek, S. | |
| dc.date.accessioned | 2025-12-11T00:29:27Z | |
| dc.date.issued | 2022 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Dursun] Ahmet Faruk, Bilgisayar Mühendisliǧi Bölümü, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Seyhan] Kübra, Bilgisayar Mühendisliǧi Bölümü, Ondokuz Mayis Üniversitesi, Samsun, Turkey; [Akleylek] Sedat, Uygulama Ve Araştirma Merkezi, Ondokuz Mayis Üniversitesi, Samsun, Turkey | en_US |
| dc.description | Aselsan; et al.; Havelsan; Turk Telekom; Turkcell; Vodafone | en_US |
| dc.description.abstract | There is a requirement to examine the post-quantum security of the mobile devices with Android operating system. Although the most suitable candidates for meeting this requirement are the finalists of the NIST standardization process, there is no version of these algorithms that can work directly on Android devices in the published documents. Therefore, there is a need to adaptation KEM algorithms, which are required for secure communication after quantum computers in Android devices. In this paper, the NIST's lattice-based standard CRYSTAL-KYBER and finalist SABER and NTRU KEM algorithms are adopted to the Java environment. A library that can be used directly on Android devices is developed. Using the developed library, evaluation results are presented in terms of average running times, memory usage and CPU usage. © 2022 IEEE. | en_US |
| dc.identifier.doi | 10.1109/ISCTURKEY56345.2022.9931767 | |
| dc.identifier.endpage | 37 | en_US |
| dc.identifier.isbn | 9781665456036 | |
| dc.identifier.scopus | 2-s2.0-85142822982 | |
| dc.identifier.startpage | 31 | en_US |
| dc.identifier.uri | https://doi.org/10.1109/ISCTURKEY56345.2022.9931767 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12712/36733 | |
| dc.language.iso | tr | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.relation.ispartof | -- 15th International Conference on Information Security and Cryptography, ISCTURKEY 2022 -- 2022-10-19 through 2022-10-20 -- Ankara -- 184067 | en_US |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Android Operating System | en_US |
| dc.subject | CRYSTALS-Kyber | en_US |
| dc.subject | Key Encapsulation Mechanism | en_US |
| dc.subject | NTRU | en_US |
| dc.subject | Post-Quantum Cryptography | en_US |
| dc.subject | SABER | en_US |
| dc.title | Adapted KEM Applications for Post-Quantum Security of Mobile Devices | en_US |
| dc.title.alternative | Mobil Cihazların Kuantum Sonrası Güvenliği için Uyarlanmış KEM Uygulamaları | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication |
