Essays about: "Asymmetric Cryptography"

Showing result 1 - 5 of 16 essays containing the words Asymmetric Cryptography.

  1. 1. How is Polly? Revisiting the Differential Attack on Polly Cracker after 20 years

    University essay from Lunds universitet/Matematikcentrum

    Author : Christoph Strobl; [2022]
    Keywords : Gröbner Bases; polly cracker; differential attack; asymmetric cryptography; multivariate cryptography; public-key cryptography; Mathematics and Statistics; Technology and Engineering;

    Abstract : För att skapa nya krypteringsalgoritmer är man alltid på jakt efter svårlösta matematiska problem. Men är alla problem lämpliga? Uppsatsen behandlar Gröbnerbaser över ändliga kroppar och visar att de är inte lämpliga för att bygga säkra krypteringsalgoritmer. READ MORE

  2. 2. GNSS Safety and Handling

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Axel Björklund; [2022]
    Keywords : Navigation; GNSS; GPS; Galileo; OSNMA; TESLA protocol; SHA-256; jamming; spoofing; SDR; GPS-SDR-SIM; Smart Tachograph; dead reckoning; U-blox; Volvo Group; Volvo FH;

    Abstract : Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. READ MORE

  3. 3. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tianpeng Ju; [2021]
    Keywords : Cryptography; neural network; asymmetric encryption; multiparty systems; Kryptografi; neuronnätverk; asymmetrisk kryptering; flerpartssystem;

    Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE

  4. 4. On the Use of Elliptic Curves in Public-Key Cryptography

    University essay from Lunds universitet/Matematik LTH; Lunds universitet/Matematik (naturvetenskapliga fakulteten)

    Author : Christoph Strobl; [2020]
    Keywords : Elliptic Curves; Public-Key Cryptography; Index Calculus; Pohlig-Hellman; Diffie-Hellman Problem; Asymmetric Cryptography; Mathematics and Statistics;

    Abstract : Uppsatsen behandlar asymmetrisk kryptering över ändliga kropper och elliptiska kurver. Elliptiska kurver införs med hjälp av affint och projektivt rum. Uppsaten också ger en introduction till algoritmer som kan knäcka diskret logaritm problemet över kropper och elliptiska kurver.. READ MORE

  5. 5. A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol

    University essay from Linköpings universitet/Informationskodning

    Author : Markus Alvila; [2019]
    Keywords : post-quantum; resistant; cryptography; commutative; supersingular; isogeny; Diffie-Hellman; CSIDH; Signal; protocol; X3DH; Double Ratchet; Curve25519; performance; evaluation; CPU; profiling; Android;

    Abstract : The Signal protocol can be considered state-of-the-art when it comes to secure messaging, but advances in quantum computing stress the importance of finding post-quantum resistant alternatives to its asymmetric cryptographic primitives. The aim is to determine whether existing post-quantum cryptography can be used as a drop-in replacement for the public-key cryptography currently used in the Signal protocol and what the performance trade-offs may be. READ MORE