Essays about: "RSA"
Showing result 11 - 15 of 58 essays containing the word RSA.
-
11. Integer factorization algorithms
University essay from Umeå universitet/Institutionen för matematik och matematisk statistikAbstract : The mathematical area of integer factorization has gone a long way since the early days of Pierre de Fermat, and with simpler algorithms developed in the last century such as the Trial division and Pollards rho algorithm to the more complex method of the Quadratic sieve algorithm (QS), we have now arrived at the General Number Field Sieve (GNFS) which has been recognized as the fastest integer factorization algorithm for very large numbers. Today the research of integer factorization has many applications, among others in the security systems of encryption methods like the famous RSA algorithm. READ MORE
-
12. Self-Organizing High-Assurance Privacy
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : When using a network, devices might have to securely communicate with oneanother. Issues arise when the devices are unaware of others in the network, orwhen the devices have to be manually updated with the information about thedevices they wish to communicate with. This presents an issue with bootstrappingover networks. READ MORE
-
13. Improvement Strategies in Construction Sites : Development of Rapid Site Assessment for House-building Industry
University essay from Luleå tekniska universitet/Institutionen för samhällsbyggnad och naturresurserAbstract : The construction industry has deteriorated during the past 40 years. Up to 35 % of the production cost is from wastes. The manufacturing industry has had an opposite development, in many cases owing to the contributions of Lean Production and various assessment tools. READ MORE
-
14. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE
-
15. A Web-Based Application for the Secure Transfer of NGS data
University essay from Uppsala universitet/Experimentell och klinisk onkologiAbstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE