Essays about: "NIST: National Institute of Standards and Technology"
Showing result 1 - 5 of 16 essays containing the words NIST: National Institute of Standards and Technology.
-
1. Towards Automatic Model Atoms from the VALD Atomic Database: from He to U
University essay from Uppsala universitet/Teoretisk astrofysikAbstract : The ejecta following the collision and merging of two neutron stars (kilonova) are currently considered promising sites for nucleosynthesis of r-process elements. Since the observed kilonova in 2017, GW2017817, astrophysicists have been working to analyze the collected electromagnetic spectra, trying to identify r-process elements. READ MORE
-
2. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE
-
3. Implementation of the signature scheme Rainbow on SoC FPGA
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Thanks to the research progress, quantum computers are slowly becoming a reality, and some companies already have working prototypes. While this is great news for some, it also means that part of the encryption used today will be rendered unsafe and obsolete. READ MORE
-
4. Security Analysis of Microservice Choices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security research is beneficial for companies that want their system protected against threats to their business. The focus of this project is on security considerations. These considerations are with regards to when companies want to evaluate the benefits of extracting microservices from their monolithic system. READ MORE
-
5. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE