Essays about: "SHA-256"

Showing result 1 - 5 of 8 essays containing the word SHA-256.

  1. 1. GNSS Safety and Handling

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Axel Björklund; [2022]
    Keywords : Navigation; GNSS; GPS; Galileo; OSNMA; TESLA protocol; SHA-256; jamming; spoofing; SDR; GPS-SDR-SIM; Smart Tachograph; dead reckoning; U-blox; Volvo Group; Volvo FH;

    Abstract : Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. READ MORE

  2. 2. Testing Platform for Memory IPs using PULPissimo

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adithya Saikrishna Pabbisetty; [2022]
    Keywords : Technology and Engineering;

    Abstract : Memory IPs are important components in SoC designs. Hence, making sure that the memory IPs are functioning as expected is crucial for any organization. In order to do so, memory IPs must be tested. In addition, the testing capabilities can be enhanced by integrating a processor to the memory test chip. READ MORE

  3. 3. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Louise Bergman Martinkauppi; Qiuping He; [2019]
    Keywords : cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Abstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE

  4. 4. A Web-Based Application for the Secure Transfer of NGS data

    University essay from Uppsala universitet/Experimentell och klinisk onkologi

    Author : Ina Odén Österbo; [2019]
    Keywords : NGS; next generation sequencing; security; transfer; cryptography; AES; RSA;

    Abstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE

  5. 5. The blockchain based system to guarantee the data integrity of IIoT

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Yifei Shen; [2018]
    Keywords : SHA-256; blockchain; data integrity; IoT; IIoT;

    Abstract : With the advent of big data era, there is countless data produced from various kinds of machines every second. These data are used to help people to do studies, produce goods, improve the efficiency of the industrial development, and so on. READ MORE