Essays about: "Kryptografi"

Showing result 1 - 5 of 36 essays containing the word Kryptografi.

  1. 1. Blockchain-based e-voting system without digital ID: A Proof-of-Concept

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Leonard Schick; [2024]
    Keywords : Computer science; Cryptography; Crypto; Blockchain; Distributed systems; e-voting; electronic voting; Ethereum; Hyperledger; Hyperledger besu; Decentralization; Datavetenskap; Kryptografi; Blockkedja; Distribuerade system; e-röstning; Elektronisk röstning; Blinda signaturer; Ethereum; Hyperledger Besu; Decentralisering;

    Abstract : Electronic voting systems have the potential to offer a cost effective, secure and transparent way of communicating with the citizens, increasing trust and participation. However creating a secure open source electronic voting system providing confidentiality and transparency with sufficient performance has long been a challenge. READ MORE

  2. 2. Homomorphic encryption

    University essay from KTH/Matematik (Avd.)

    Author : Daniel Sanaee; [2023]
    Keywords : Mathematics; Cryptography; Computer science; Group Theory; Matematik; Kryptografi; Datalogi; Gruppteori;

    Abstract : The problem of constructing a secure encryption scheme that allows for computation on encrypted data was an open problem for more than 30 years. In 2009, Craig Gentry solved the problem, constructing the first fully homomorphic encryption (FHE) scheme. READ MORE

  3. 3. The Effect of Noise Levels on the Performance of Shor’s Algorithm

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Höstedt; Tobias Ljunggren; [2023]
    Keywords : Bachelor’s thesis; Quantum Computing; Shor’s algorithm; Noise; Cryptography; Qiskit; Kandidatexamensarbete; Kvantdatorer; Shors algorithm; Brus; Kryptografi; Qiskit;

    Abstract : Advanced enough quantum computers promise to revolutionise fields such as cryptography, drug discovery and simulations of complex systems. Quantum computers are built on qubits which are fragile and susceptible to error-inducing interference, which is called noise. READ MORE

  4. 4. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  5. 5. Privacy-preserving Authentication in Participatory Sensing Systems : An attribute based authentication solution with sensor requirement enforcement.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jose Luis Martin Navarro; [2023]
    Keywords : Anonymous authentication; privacy; ABS; participatory-sensing-systems; applied-cryptography; mobile-crowdsensing; Anonym autentisering; integritet; ABS; deltagande-avkänningssystem; tillämpad kryptografi; mobil-crowdsensing;

    Abstract : Participatory Sensing Systems (PSS) are a type of Mobile Crowdsensing System where users voluntarily participate in contributing information. Task initiators create tasks, targeting specific data that needs to be gathered by the users’ device sensors. READ MORE