Essays about: "Cryptography"

Showing result 1 - 5 of 180 essays containing the word Cryptography.

  1. 1. Models, Keys, and Cryptanalysis: Evaluating historical statistical language models in cryptanalysis of homophonic substitution ciphers

    University essay from Göteborgs universitet/Institutionen för filosofi, lingvistik och vetenskapsteori

    Author : Filip Fornmark; [2023-01-19]
    Keywords : statistical language models; cryptanalysis; historical cryptology; homophonic substitution;

    Abstract : This thesis presents an empirical study connected to historical cryptography and especially within the framework of the research project DECRYPT. One of the research questions in the DECRYPT project relates to the use of language models for automatic cryptanalysis. READ MORE

  2. 2. Evaluating and Fine-Tuning a Few-Shot Model for Transcription of Historical Ciphers

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Ingrid Eliasson; [2023]
    Keywords : historical ciphers; few-shot learning; automatic transcription;

    Abstract : Thousands of historical ciphers, encrypted manuscripts, are stored in archives across Europe. Historical cryptology is the research field concerned with studying these manuscripts - combining the interest of humanistic fields with methods of cryptography and computational linguistics. READ MORE

  3. 3. The Effect of Noise Levels on the Performance of Shor’s Algorithm

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Höstedt; Tobias Ljunggren; [2023]
    Keywords : Bachelor’s thesis; Quantum Computing; Shor’s algorithm; Noise; Cryptography; Qiskit; Kandidatexamensarbete; Kvantdatorer; Shors algorithm; Brus; Kryptografi; Qiskit;

    Abstract : Advanced enough quantum computers promise to revolutionise fields such as cryptography, drug discovery and simulations of complex systems. Quantum computers are built on qubits which are fragile and susceptible to error-inducing interference, which is called noise. READ MORE

  4. 4. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  5. 5. Privacy-preserving Authentication in Participatory Sensing Systems : An attribute based authentication solution with sensor requirement enforcement.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jose Luis Martin Navarro; [2023]
    Keywords : Anonymous authentication; privacy; ABS; participatory-sensing-systems; applied-cryptography; mobile-crowdsensing; Anonym autentisering; integritet; ABS; deltagande-avkänningssystem; tillämpad kryptografi; mobil-crowdsensing;

    Abstract : Participatory Sensing Systems (PSS) are a type of Mobile Crowdsensing System where users voluntarily participate in contributing information. Task initiators create tasks, targeting specific data that needs to be gathered by the users’ device sensors. READ MORE