Essays about: "Cryptography"
Showing result 21 - 25 of 186 essays containing the word Cryptography.
-
21. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE
-
22. Rethinking Execution Layer Front-Running Protection with Threshold Encryption : F3B: A Per-Transaction Front-Running Protection Architecture with Low-Latency Overhead
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Blockchain is a decentralized and immutable append-only ledger. Smart contracts, the self-executing programs on blockchain, help build the Decentralized Finance (DeFi) markets. Front-running is the practice of benefiting from advanced knowledge of pending transactions. READ MORE
-
23. A deep learning based side-channel analysis of an FPGA implementation of Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In 2016, NIST started a post quantum cryptography (PQC) standardization project in response to the rapid development of quantum algorithms which break many public-key cryptographic schemes. As the project nears its end, it is necessary to assess the resistance of its finalists to side-channel attacks. READ MORE
-
24. Formal security verification of the Drone Remote Identification Protocol using Tamarin
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. READ MORE
-
25. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE