Essays about: "Aes"
Showing result 1 - 5 of 99 essays containing the word Aes.
-
1. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE
-
2. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. READ MORE
-
3. Partitioning oracle attacks against variants of AES-GCM and ChaCha20-Poly1305
University essay from Linnéuniversitetet/Institutionen för matematik (MA)Abstract : We investigate so-called partitioning oracle attacks against AES-GCM and ChaCha20-Poly1305 along with some improvements. Such attacks against these two cryptosystems are efficient because they can be reduced to solving linear systems of equations over finite fields. READ MORE
-
4. Analyzing components of barrier coatings in different fractions during a repulping process.
University essay from Örebro universitet/Institutionen för naturvetenskap och teknikAbstract : During paper manufacturing, coating and adhesives are added to paper and cardboard to improve quality and durability. When the paper is later recycled or becoming new paper, the coatings may pollute the water used in the recycling process. Thus, it is important to know in which fraction these coatings finish during the process. READ MORE
-
5. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. READ MORE
