Essays about: "Digital signatures"

Showing result 21 - 25 of 36 essays containing the words Digital signatures.

  1. 21. On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Sai Prashanth Josyula; [2015]
    Keywords : Digital signatures; Elliptic curve cryptography; GLV method; Side-channel attack;

    Abstract : Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. READ MORE

  2. 22. The Needed Input Data for Accurate On-line Signature Verification : The relevance of pressure and pen inclination for on-line signature verification

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Thomas Sjöholm; [2015]
    Keywords : Online signature verification; signature verification; dynamic time warp; pressure sensitivity; susig; Sabanci University Signature Database; signaturverifiering; tryckkänslighet; susig; Sabanci University Signature Database;

    Abstract : Signatures have been used to authenticate documents and transactions for over 1500 years and are still being used today. In this project a method for verifying signatures written on a tablet has been developed and tested in order to test whether pressure information is vital for a well performing on-line signature verification systems. READ MORE

  3. 23. Hardware Security Module Performance Optimization by Using a "Key Pool" : Generating keys when the load is low and saving in the external storage to use when the load is high

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Nima Seyed Saboonchi; [2014]
    Keywords : HSM; Digital Signature; PKI; e-Identification; RSA; SAML; HSM; Digitala signatur; PKI; e-legitimation; RSA; SAML;

    Abstract : This thesis project examines the performance limitations of Hardware Security Module (HSM) devices with respect to fulfilling the needs of security services in a rapidly growing security market in a cost-effective way. In particular, the needs due to the introduction of a new electronic ID system in Sweden (the Federation of Swedish eID) and how signatures are created and managed. READ MORE

  4. 24. New Cryptographic Key Management for Smart Grid

    University essay from Institutionen för informationsteknologi

    Author : Filip Šebesta; [2013]
    Keywords : ;

    Abstract : A smart grid is a simple upgrade of a power grid, which delivers electricity from suppliers to consumers. It uses two-way digital communication in order to control appliances at consumers’ households. Such system saves energy, reduces costs and increases reliability and transparency. READ MORE

  5. 25. The major security challenges to cloud computing.

    University essay from Högskolan i Borås/Institutionen Handels- och IT-högskolan

    Author : Muhammad Inam ul Haq; [2013]
    Keywords : Information security; packet filtering; cloud interface; digital signatures; firewalls; ICMP ping attack; data integrity;

    Abstract : Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero & Llorente, 2012). READ MORE