Essays about: "block encryption"

Showing result 1 - 5 of 12 essays containing the words block encryption.

  1. 1. Rethinking Execution Layer Front-Running Protection with Threshold Encryption : F3B: A Per-Transaction Front-Running Protection Architecture with Low-Latency Overhead

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyan Qu; [2023]
    Keywords : Blockchain; Front Running; Threshold Encryption; Blockchain; Front Running; Tröskelkryptering;

    Abstract : Blockchain is a decentralized and immutable append-only ledger. Smart contracts, the self-executing programs on blockchain, help build the Decentralized Finance (DeFi) markets. Front-running is the practice of benefiting from advanced knowledge of pending transactions. READ MORE

  2. 2. Design systems in the Public Key Infrastructure area : Usability, ethics, and impact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jessica Lucchetta; [2022]
    Keywords : Design system; Ethical risks; Public key infrastructure; Design system; Etiska risker; Public key infrastructure;

    Abstract : This research was conducted in the field of public key infrastructures (PKI). This sector is highly confidential and deals with managing security through encryption. The products in this area are technical: the user interface and user experience aspects are not prioritized and they are usually ignored or downplayed. READ MORE

  3. 3. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  4. 4. Client controlled, secure endpointto-endpoint storage in the cloud

    University essay from KTH/Hälsoinformatik och logistik

    Author : Maximilian Michelson; [2020]
    Keywords : ;

    Abstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE

  5. 5. Parallel Aes diffusion inter block diffusion at bit level and compression

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Milap Shah; [2020]
    Keywords : cryptography; AES;

    Abstract : Information is an intelligent data through which knowledgeable and usable things can be convicted or interpreted in a proper manner. With the advancement of technology, transmission of information over the network has come a trend. This information must be transmitted securely over the network. READ MORE