Essays about: "SCA"
Showing result 6 - 10 of 225 essays containing the word SCA.
-
6. Washing efficiency in the pulp mill : An evaluation of the washing efficiency in SCA Munksund's pulp mill
University essay from KTH/Fiber- och polymerteknologiAbstract : Munksunds pappersbruk är ett integrerat massa- och pappersbruk som består av två fiberlinjer, en barr- och en lövlinje där båda kokarna är kontinuerliga med efterföljande tvättsteg. En kartering av COD (eng. Chemical Oxygen Demand) och natrium utfördes för båda linjerna för att utvärdera tvätteffektiviteten. READ MORE
-
7. Vulnerability Management of Open-Source Libraries
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE
-
8. Exploring Knowledge Vaults with ChatGPT : A Domain-Driven Natural Language Approach to Document-Based Answer Retrieval
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Problemlösning är en viktig aspekt i många yrken. Inklusive fabriksmiljöer, där problem kan leda till minskad produktion eller till och med produktionsstopp. Denna studie fokuserar på en specifik domän: en massafabrik i samarbete med SCA Massa. READ MORE
-
9. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
10. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE