Essays about: "Public-key cryptography"

Showing result 1 - 5 of 35 essays containing the words Public-key cryptography.

  1. 1. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  2. 2. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Linus Backlund; [2023]
    Keywords : Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE

  3. 3. A deep learning based side-channel analysis of an FPGA implementation of Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yanning Ji; [2022]
    Keywords : Side-Channel Attack; Deep Learning; Post-quantum Cryptography; Sidokanalsattack; djupinlärning; postkvantkryptering;

    Abstract : In 2016, NIST started a post quantum cryptography (PQC) standardization project in response to the rapid development of quantum algorithms which break many public-key cryptographic schemes. As the project nears its end, it is necessary to assess the resistance of its finalists to side-channel attacks. READ MORE

  4. 4. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  5. 5. Bootstrapping Secure Sensor Networks in the Internet of Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Edman; [2022]
    Keywords : Internet of Things; Machine-to-machine communications; Internet security; Cryptographic protocols; Sakernas internet; Maskin-till-maskin kommunikation; Säkerhet på internet; Kryptografiska protokoll;

    Abstract : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. READ MORE