Essays about: "Encrypted key generation"

Found 3 essays containing the words Encrypted key generation.

  1. 1. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Linus Backlund; [2023]
    Keywords : Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE

  2. 2. Autonomous email notification- and booking management system : In a property administration environment

    University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronik

    Author : Henrik Söderlund; [2017]
    Keywords : Notification; Autonomous; Email; Software; Booking management; Encrypted key generation; Data Under Central; Notifikation; Autonomt; Email; Mjukvara; Bokningshantering; Enkrypterad nyckelgenerering; Data Under Central;

    Abstract : The contracting company is in the desire of an autonomous system that can do tedious administrative work that is today done manually. They would like to autonomically notify customers about incoming alarms from the customers’ real estates’ Data Under Centrals and to notify about bookings, in which a complete booking system has to be created, together with a file system analyzer that notifies about new files in the customers’ project folders. READ MORE

  3. 3. The Implementation of the Frequency-Time Encoded Decoy-State Protocol with the Slow-Light Effect for Quantum Memories

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Atomfysik

    Author : Koray Dinçer; [2017]
    Keywords : QKD; Decoy-State; Frequency-Time; Slow-light; Quantum Repeater; Quantum Memory; Physics and Astronomy;

    Abstract : Quantum key distribution (QKD) is a secure encryption key generation process to be used by two users in the presence of an eavesdropper. The no-cloning theorem allows the sender "Alice" to securely send qubits with single photons to the receiver "Bob". READ MORE