Essays about: "algorithm cryptography"
Showing result 1 - 5 of 39 essays containing the words algorithm cryptography.
-
1. Blockchain-based e-voting system without digital ID: A Proof-of-Concept
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Electronic voting systems have the potential to offer a cost effective, secure and transparent way of communicating with the citizens, increasing trust and participation. However creating a secure open source electronic voting system providing confidentiality and transparency with sufficient performance has long been a challenge. READ MORE
-
2. Models, Keys, and Cryptanalysis: Evaluating historical statistical language models in cryptanalysis of homophonic substitution ciphers
University essay from Göteborgs universitet/Institutionen för filosofi, lingvistik och vetenskapsteoriAbstract : This thesis presents an empirical study connected to historical cryptography and especially within the framework of the research project DECRYPT. One of the research questions in the DECRYPT project relates to the use of language models for automatic cryptanalysis. READ MORE
-
3. Homomorphic encryption
University essay from KTH/Matematik (Avd.)Abstract : The problem of constructing a secure encryption scheme that allows for computation on encrypted data was an open problem for more than 30 years. In 2009, Craig Gentry solved the problem, constructing the first fully homomorphic encryption (FHE) scheme. READ MORE
-
4. The Effect of Noise Levels on the Performance of Shor’s Algorithm
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Advanced enough quantum computers promise to revolutionise fields such as cryptography, drug discovery and simulations of complex systems. Quantum computers are built on qubits which are fragile and susceptible to error-inducing interference, which is called noise. READ MORE
-
5. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE