Essays about: "asymmetric encryption"

Showing result 1 - 5 of 9 essays containing the words asymmetric encryption.

  1. 1. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tianpeng Ju; [2021]
    Keywords : Cryptography; neural network; asymmetric encryption; multiparty systems; Kryptografi; neuronnätverk; asymmetrisk kryptering; flerpartssystem;

    Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE

  2. 2. User Attitudes around Key Management, and their Impact on Blockchain Technology Adoption

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Daniel Jozsef; [2019]
    Keywords : blockchain; encryption; identity; online identity; sovereignty; self-sovereign; technology acceptance; tam; technology acceptance model; qualitative; user attitudes;

    Abstract : The following study examines the background of users’ decisions about their behavior concerning online identity, specifically looking at the acceptance or rejection of self-sovereign identity solutions and the technologies that support them: blockchain and asymmetric encryption. A qualitative analysis is presented of typical user narratives concerning online behavior, while exploring the cultural values underlying users’ decisions about accepting or rejecting new, potentially emancipatory technologies. READ MORE

  3. 3. Post-Quantum Public Key Cryptography for the Internet of Things

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Olof Magnusson; Mats Hurtig; [2019]
    Keywords : Cryptography; Post-quantum lightweight encryption; NTRUEncrypt; WolfSSL; Transport layer security; Application domain; Quantum computers;

    Abstract : Recent progress in the field of quantum computers provide radically improved muscles to search and sort in lists, solve systems of equations and prime factorize – virtues that inflict an immediate threat to the most common systems for public key cryptography used in a vast proportion of today’s computer networks. NTRUEncrypt is a lattice-based cryptography system which inhibits quantum computers for breaking the algorithm in polynomial time. READ MORE

  4. 4. A Web-Based Application for the Secure Transfer of NGS data

    University essay from Uppsala universitet/Experimentell och klinisk onkologi

    Author : Ina Odén Österbo; [2019]
    Keywords : NGS; next generation sequencing; security; transfer; cryptography; AES; RSA;

    Abstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE

  5. 5. Security of Big Data: Focus on Data Leakage Prevention (DLP)

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Richard Nyarko; [2018]
    Keywords : Big data; big data security; data leakage prevention; data leakage prevention system;

    Abstract : Data has become an indispensable part of our daily lives in this era of information age. The amount of data which is generated is growing exponentially due to technological advances. This voluminous of data which is generated daily has brought about new term which is referred to as big data. READ MORE