Essays about: "Saber"
Showing result 1 - 5 of 13 essays containing the word Saber.
-
1. Battery Degradation and Health Monitoring in Lithium-Ion Batteries: An Evaluation of Parameterization and Sensor Fusion Strategies
University essay from Linköpings universitet/Institutionen för systemteknikAbstract : The purpose of this project was to perform model-based diagnosis on Li-ion batteries using real-world data and sensor fusion algorithms. The data used in this project was collected and distributed by NASA and mainly consists of voltage and current measurements collected on numerous batteries that were repeatedly charged and discharged from their beginning of life, and until surpassing their end of life. READ MORE
-
2. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE
-
3. A deep learning based side-channel analysis of an FPGA implementation of Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In 2016, NIST started a post quantum cryptography (PQC) standardization project in response to the rapid development of quantum algorithms which break many public-key cryptographic schemes. As the project nears its end, it is necessary to assess the resistance of its finalists to side-channel attacks. READ MORE
-
4. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE
-
5. Natural and Assistive Driving Simulator User Interfaces for CARLA
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the autonomous vehicles are getting clo-ser to commercial roll out, the challenges for the developersof the software are getting more complex. One challenge thedevelopers are facing is the interaction between humans andautonomous vehicles in traffic. READ MORE