Essays about: "NIST: National Institute of Standards and Technology"

Showing result 1 - 5 of 16 essays containing the words NIST: National Institute of Standards and Technology.

  1. 1. Towards Automatic Model Atoms from the VALD Atomic Database: from He to U

    University essay from Uppsala universitet/Teoretisk astrofysik

    Author : Samuel Hermansson; [2023]
    Keywords : r-process; nucleosynthesis; kilonovae; VALD;

    Abstract : The ejecta following the collision and merging of two neutron stars (kilonova) are currently considered promising sites for nucleosynthesis of r-process elements. Since the observed kilonova in 2017, GW2017817, astrophysicists have been working to analyze the collected electromagnetic spectra, trying to identify r-process elements. READ MORE

  2. 2. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Linus Backlund; [2023]
    Keywords : Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE

  3. 3. Implementation of the signature scheme Rainbow on SoC FPGA

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Tomas Preucil; [2022]
    Keywords : ;

    Abstract : Thanks to the research progress, quantum computers are slowly becoming a reality, and some companies already have working prototypes. While this is great news for some, it also means that part of the encryption used today will be rendered unsafe and obsolete. READ MORE

  4. 4. Security Analysis of Microservice Choices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daniel Dannberg; [2021]
    Keywords : Threat modeling; Security; Microservices; The Common Misuse Scoring System; National Institute of Standards and Technology; Return Of Security Investment; Hotmodellering; Säkerhet; Mikrotjänster; Säkerhetsinvestering; Evaluering av säkerhet;

    Abstract : Security research is beneficial for companies that want their system protected against threats to their business. The focus of this project is on security considerations. These considerations are with regards to when companies want to evaluate the benefits of extracting microservices from their monolithic system. READ MORE

  5. 5. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alex Gustafsson; Carl Stensson; [2021]
    Keywords : Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Abstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE