Essays about: "asymmetrisk kryptering"

Showing result 1 - 5 of 6 essays containing the words asymmetrisk kryptering.

  1. 1. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alex Gustafsson; Carl Stensson; [2021]
    Keywords : Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Abstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE

  2. 2. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tianpeng Ju; [2021]
    Keywords : Cryptography; neural network; asymmetric encryption; multiparty systems; Kryptografi; neuronnätverk; asymmetrisk kryptering; flerpartssystem;

    Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE

  3. 3. On the Use of Elliptic Curves in Public-Key Cryptography

    University essay from Lunds universitet/Matematik LTH; Lunds universitet/Matematik (naturvetenskapliga fakulteten)

    Author : Christoph Strobl; [2020]
    Keywords : Elliptic Curves; Public-Key Cryptography; Index Calculus; Pohlig-Hellman; Diffie-Hellman Problem; Asymmetric Cryptography; Mathematics and Statistics;

    Abstract : Uppsatsen behandlar asymmetrisk kryptering över ändliga kropper och elliptiska kurver. Elliptiska kurver införs med hjälp av affint och projektivt rum. Uppsaten också ger en introduction till algoritmer som kan knäcka diskret logaritm problemet över kropper och elliptiska kurver.. READ MORE

  4. 4. On Intersections of Algebraic Curves and Applications to Elliptic Curves

    University essay from Lunds universitet/Matematik (naturvetenskapliga fakulteten)

    Author : Karl Lindén; [2018]
    Keywords : Bezout s theorem; Max Noether s fundamental theorem; Pappus s theorem; Pascal s theorem; Chasles theorem; algebraic curves; elliptic curves; Mathematics and Statistics;

    Abstract : In this thesis we state and give elementary proofs for some fundamental results about intersections of algebraic curves, namely Bezout's, Max Noether's, Pappus's, Pascal's and Chasles' theorems. Our main tools are linear algebra and basic ring theory. We conclude the thesis by applying the results to elliptic curves.. READ MORE

  5. 5. Namecoin as authentication for public-key cryptography

    University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska högskolan

    Author : Tomas Melin; Tomas Vidhall; [2014]
    Keywords : Namecoin; block chain; public-key chryptography;

    Abstract : Public-key cryptography is a subject that is very important to everyone who wants confidentiality and privacy in networks. It is important to understand how public-key cryptography systems work and what flaws they have. In the first part of this report we describe some of the most common encryption schemes and key agreements. READ MORE