Essays about: "encryption Algorithms"

Showing result 1 - 5 of 71 essays containing the words encryption Algorithms.

  1. 1. XZDDF Bootstrapping in Fully Homomorphic Encryption

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Simon Ljungbeck; [2024]
    Keywords : Fully Homomorphic Encryption; Homomorphic Encryption; Bootstrapping; Blind Rotation; XZDDF; Technology and Engineering;

    Abstract : Despite the vast research on the topic in recent years, fully homomorphic encryption schemes remain time-inefficient. The main bottleneck is the so-called bootstrapping, whose purpose is to reduce noise that has accumulated after having performed homomorphic operations on a ciphertext. READ MORE

  2. 2. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  3. 3. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  4. 4. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Klasson Landin; Truls Julborg; [2023]
    Keywords : Side channel attack; Cryptography; Correlation power analysis; Chipwhisperer; Frequency; Hardware security;

    Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE

  5. 5. Developing an educational tool for simulations of quantum key distribution systems

    University essay from KTH/Skolan för teknikvetenskap (SCI)

    Author : Erik Åkerberg; Erik Marton Åsgrim; [2023]
    Keywords : ;

    Abstract : Quantum key distribution (QKD) is the idea of using quantum systems to securely communicate a shared encryption key between two parties. In contrast to classical methods of encryption, QKD utilizes fundamental quantum properties such as superposition and entanglement to encode information in a way that guarantees security. READ MORE