Essays about: "RSA"
Showing result 26 - 30 of 58 essays containing the word RSA.
-
26. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE
-
27. Performance and Comparison of post-quantum Cryptographic Algorithms
University essay from Linköpings universitet/Institutionen för systemteknikAbstract : Secure and reliable communication have always been critical part of todays infrastructure. Various asymmetric encryption schemes, such as RSA, have been used to achieve this goal. READ MORE
-
28. RSA authentication in Internet of Things : Technical limitations and industry expectations
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : The objective of this thesis is to evaluate if it is possible to run RSA authentication in a specified scenario. A Raspberry Pi with a limited CPU is used to simulate a low-performance device. A series of tests on this device shows that it is not possible to run RSA authentication in the provided scenario. READ MORE
-
29. The Implementation of the Frequency-Time Encoded Decoy-State Protocol with the Slow-Light Effect for Quantum Memories
University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/AtomfysikAbstract : Quantum key distribution (QKD) is a secure encryption key generation process to be used by two users in the presence of an eavesdropper. The no-cloning theorem allows the sender "Alice" to securely send qubits with single photons to the receiver "Bob". READ MORE
-
30. Anonymous networks: A theoretical and practical approach
University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska fakultetenAbstract : This thesis presents an overview of different solutions for anonymous networks. Theory behind connection- and data-anonymity is described, how to implement them and the theory behind commonly used cryptography. READ MORE