A key-encapsulation mechanism (KEM) is a set of algorithms that, under certain conditions, can be used by two parties to establish a shared secret key over a public channel. A shared secret key that is securely established using a KEM can then be used with symmetric-key cryptographic algorithms to perform basic tasks in secure communications, such as encryption and authentication. This standard specifies a key-encapsulation mechanism called ML-KEM. The security of ML-KEM is related to the com...| csrc.nist.gov
NIST is encouraging computer system administrators to begin transitioning to the new standards as soon as possible.| NIST
Xiphera's ML-KEM (CRYSTALS-Kyber) IP core implements post-quantum cryptography (PQC) in Key Encapsulation Mechanism (KEM).| Xiphera
Xiphera's xQlave® ML-DSA (CRYSTALS-Dilithium) IP core for digital signatures safeguards from the risks of quantum attacks.| Xiphera
Xiphera’s xQlave® family consists of quantum-secure IP cores, offering secure and efficient implementations of Post-Quantum Cryptography (PQC)| Xiphera
Latest news and updates in the field of cryptography. Check out our latest product news & updates here.| Xiphera