Essays about: "Digital signature algorithms"
Showing result 1 - 5 of 8 essays containing the words Digital signature algorithms.
-
1. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE
-
2. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE
-
3. Implementation of the signature scheme Rainbow on SoC FPGA
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Thanks to the research progress, quantum computers are slowly becoming a reality, and some companies already have working prototypes. While this is great news for some, it also means that part of the encryption used today will be rendered unsafe and obsolete. READ MORE
-
4. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE
-
5. Post-quantum algorithms for digital signing in Public Key Infrastructures
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. READ MORE