Essays about: "Digital signature algorithms"

Showing result 1 - 5 of 8 essays containing the words Digital signature algorithms.

  1. 1. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kei Duke-Bergman; Alexander Huynh; [2023]
    Keywords : Bachelor’s thesis; FPGA; SHA; Cryptography; Kandidatexamensarbete; FPGA; SHA; Kryptografi;

    Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE

  2. 2. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  3. 3. Implementation of the signature scheme Rainbow on SoC FPGA

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Tomas Preucil; [2022]
    Keywords : ;

    Abstract : Thanks to the research progress, quantum computers are slowly becoming a reality, and some companies already have working prototypes. While this is great news for some, it also means that part of the encryption used today will be rendered unsafe and obsolete. READ MORE

  4. 4. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Louise Bergman Martinkauppi; Qiuping He; [2019]
    Keywords : cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Abstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE

  5. 5. Post-quantum algorithms for digital signing in Public Key Infrastructures

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Mikael Sjöberg; [2017]
    Keywords : Post-quantum algorithms; Digital signature algorithms; Public Key Infrastructures;

    Abstract : One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. READ MORE