Essays about: "Cryptography"

Showing result 1 - 5 of 136 essays containing the word Cryptography.

  1. 1. Client controlled, secure endpointto-endpoint storage in the cloud

    University essay from KTH/Hälsoinformatik och logistik

    Author : Maximilian Michelson; [2020]
    Keywords : ;

    Abstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE

  2. 2. Parallel Aes diffusion inter block diffusion at bit level and compression

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Milap Shah; [2020]
    Keywords : cryptography; AES;

    Abstract : Information is an intelligent data through which knowledgeable and usable things can be convicted or interpreted in a proper manner. With the advancement of technology, transmission of information over the network has come a trend. This information must be transmitted securely over the network. READ MORE

  3. 3. On Asynchronous Group Key Agreement : Tripartite Asynchronous Ratchet Trees

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2020]
    Keywords : MLS; secure messaging; cryptography; MLS; säker meddelandehantering; kryptografi;

    Abstract : The subject of secure messaging has gained notable attention lately in the cryptographic community. For communications between two parties, paradigms such as the double ratchet, used in the Signal protocol, provide provably strong security guarantees such as forward secrecy and post-compromise security. READ MORE

  4. 4. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

    University essay from Linköpings universitet/Informationskodning

    Author : Hampus Eriksson; [2020]
    Keywords : post-quantum; cryptography; lattice-based cryptography; quantum-resistant; Kyber; constrained device; performance; evaluation; implementation;

    Abstract : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. READ MORE

  5. 5. A study and review of distributed ledger technologies

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Maria Olsson; [2020]
    Keywords : ;

    Abstract : With the rise in popularity of cryptocurrencies, distributed ledger technology is a term that has gained traction. The aim of this study is to review and comparethe distributed ledger technologies blockchain and directed acyclic graph, examining their internal structures as well as some platforms and existing areas of application. READ MORE