Essays about: "ECDSA"
Showing result 1 - 5 of 7 essays containing the word ECDSA.
-
1. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE
-
2. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE
-
3. Post-quantum algorithms for digital signing in Public Key Infrastructures
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. READ MORE
-
4. Points of High Order on Elliptic Curves : ECDSA
University essay from Linnéuniversitetet/Institutionen för matematik (MA)Abstract : This master thesis is about Elliptic Curve Digital Signature Algorithm or ECDSA and two of the known attacks on this security system. The purpose of this thesis is to find points that are likely to be points of high order on an elliptic curve. If we have a point P of high order and if Q = mP, then we have a large set of possible values of m. READ MORE
-
5. On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. READ MORE