Essays about: "Master thesis cryptography"
Showing result 6 - 10 of 11 essays containing the words Master thesis cryptography.
-
6. Implementation and Evaluation of BSD Elliptic Curve Cryptography
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Security is recently arising as an important issue for the Internet of Things (IoT). Efficient ways to provide secure communication between devices and sensors is crucial for the IoT devices, which are becoming more and more used and spread in a variety of fields. READ MORE
-
7. Security for Cloud Based Services
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE
-
8. On the Properties of S-boxes : A Study of Differentially 6-Uniform Monomials over Finite Fields of Characteristic 2
University essay from KTH/Matematik (Avd.)Abstract : S-boxes are key components of many symmetric cryptographic primitives. Among them, some block ciphers and hash functions are vulnerable to attacks based on differential cryptanalysis, a technique introduced by Biham and Shamir in the early 90’s. READ MORE
-
9. A Security Study for Non-Internet Connected Managed Software
University essay from KTH/Kommunikationssystem, CoSAbstract : This master thesis project aims to improve the security of managed software developed at SCANIA's research and development group NEVE. The thesis will present several security schemes that can be effective against tampering, theft, and reverse engineering of application. READ MORE
-
10. Evaluation of Cryptographic Packages
University essay from InformationsteoriAbstract : The widespread use of computer technology for information handling resulted in the need for higher data protection.The usage of high profile cryptographic protocols and algorithms do not always necessarily guarantee high security. READ MORE