Essays about: "ECDSA"

Showing result 1 - 5 of 7 essays containing the word ECDSA.

  1. 1. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Louise Bergman Martinkauppi; Qiuping He; [2019]
    Keywords : cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Abstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE

  2. 2. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Martin Lang; [2019]
    Keywords : Automotive Ethernet; Information Security; Integrity; Time Sensitive Systems; Automotive Ethernet; Informationssäkerhet; Integritet; tidskänsliga system;

    Abstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE

  3. 3. Post-quantum algorithms for digital signing in Public Key Infrastructures

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Mikael Sjöberg; [2017]
    Keywords : Post-quantum algorithms; Digital signature algorithms; Public Key Infrastructures;

    Abstract : One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. READ MORE

  4. 4. Points of High Order on Elliptic Curves : ECDSA

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Behnaz Kouchaki Barzi; [2016]
    Keywords : Digital signature DS. ; Elliptic Curve Digital Signature Algorithm ECDSA ; Elliptic Curve Discrete Logarithm Problem ECDLP ; Baby Step; Giant Step Bs.Gs. ; Pollard’s Rho;

    Abstract : This master thesis is about Elliptic Curve Digital Signature Algorithm or ECDSA and two of the known attacks on this security system. The purpose of this thesis is to find points that are likely to be points of high order on an elliptic curve. If we have a point P of high order and if Q = mP, then we have a large set of possible values of m. READ MORE

  5. 5. On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Sai Prashanth Josyula; [2015]
    Keywords : Digital signatures; Elliptic curve cryptography; GLV method; Side-channel attack;

    Abstract : Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. READ MORE