Essays about: "encryption Algorithms"
Showing result 1 - 5 of 71 essays containing the words encryption Algorithms.
-
1. XZDDF Bootstrapping in Fully Homomorphic Encryption
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Despite the vast research on the topic in recent years, fully homomorphic encryption schemes remain time-inefficient. The main bottleneck is the so-called bootstrapping, whose purpose is to reduce noise that has accumulated after having performed homomorphic operations on a ciphertext. READ MORE
-
2. Evaluating intrusion detection points in an end-to-end solution
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE
-
3. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE
-
4. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
5. Developing an educational tool for simulations of quantum key distribution systems
University essay from KTH/Skolan för teknikvetenskap (SCI)Abstract : Quantum key distribution (QKD) is the idea of using quantum systems to securely communicate a shared encryption key between two parties. In contrast to classical methods of encryption, QKD utilizes fundamental quantum properties such as superposition and entanglement to encode information in a way that guarantees security. READ MORE