Essays about: "asymmetrisk kryptering"
Showing result 1 - 5 of 6 essays containing the words asymmetrisk kryptering.
-
1. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE
-
2. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE
-
3. On the Use of Elliptic Curves in Public-Key Cryptography
University essay from Lunds universitet/Matematik LTH; Lunds universitet/Matematik (naturvetenskapliga fakulteten)Abstract : Uppsatsen behandlar asymmetrisk kryptering över ändliga kropper och elliptiska kurver. Elliptiska kurver införs med hjälp av affint och projektivt rum. Uppsaten också ger en introduction till algoritmer som kan knäcka diskret logaritm problemet över kropper och elliptiska kurver.. READ MORE
-
4. On Intersections of Algebraic Curves and Applications to Elliptic Curves
University essay from Lunds universitet/Matematik (naturvetenskapliga fakulteten)Abstract : In this thesis we state and give elementary proofs for some fundamental results about intersections of algebraic curves, namely Bezout's, Max Noether's, Pappus's, Pascal's and Chasles' theorems. Our main tools are linear algebra and basic ring theory. We conclude the thesis by applying the results to elliptic curves.. READ MORE
-
5. Namecoin as authentication for public-key cryptography
University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska högskolanAbstract : Public-key cryptography is a subject that is very important to everyone who wants confidentiality and privacy in networks. It is important to understand how public-key cryptography systems work and what flaws they have. In the first part of this report we describe some of the most common encryption schemes and key agreements. READ MORE