Essays about: "encryption algorithm thesis"

Showing result 1 - 5 of 32 essays containing the words encryption algorithm thesis.

  1. 1. XZDDF Bootstrapping in Fully Homomorphic Encryption

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Simon Ljungbeck; [2024]
    Keywords : Fully Homomorphic Encryption; Homomorphic Encryption; Bootstrapping; Blind Rotation; XZDDF; Technology and Engineering;

    Abstract : Despite the vast research on the topic in recent years, fully homomorphic encryption schemes remain time-inefficient. The main bottleneck is the so-called bootstrapping, whose purpose is to reduce noise that has accumulated after having performed homomorphic operations on a ciphertext. READ MORE

  2. 2. Homomorphic encryption

    University essay from KTH/Matematik (Avd.)

    Author : Daniel Sanaee; [2023]
    Keywords : Mathematics; Cryptography; Computer science; Group Theory; Matematik; Kryptografi; Datalogi; Gruppteori;

    Abstract : The problem of constructing a secure encryption scheme that allows for computation on encrypted data was an open problem for more than 30 years. In 2009, Craig Gentry solved the problem, constructing the first fully homomorphic encryption (FHE) scheme. READ MORE

  3. 3. An operator theoretic approach to the Riemann Hypothesis

    University essay from Lunds universitet/Matematik (naturvetenskapliga fakulteten); Lunds universitet/Matematikcentrum

    Author : Ramon Arjan van de Scheur; [2023]
    Keywords : Riemann hypothesis; Prime number theorem; Prime number theorem for arithmetic progressions; operator theoretic equivalent; compact operator; prime-counting function; Chebyshev function; Laplace transform; Fourier transform; convolution operator; weak topology; strong topology; compact perturbation; Tauberian theorem; Poisson kernel; holomorphic; self-adjoint; spectrum; trace; Mathematics and Statistics;

    Abstract : In 2023 an operator theoretic approach to the Prime Number Theorem was introduced by Olsen. In this thesis this approach is examined and applied to give a new, operator theoretic, proof of a different version of the Prime Number Theorem and of the Prime Number Theorem for arithmetic progressions. READ MORE

  4. 4. Compression's effect on end-to-end latency in file upload systems that utilize encryption

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Kristoffer Zaar; [2023]
    Keywords : Encryption; Compression; Latency; Web-Based systems;

    Abstract : Encryption is the process of obfuscating data to restrict access to it while allowing it to be returned to its original non-obfuscated form through decryption. This process is increasingly used within web-based systems to secure data. READ MORE

  5. 5. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE