Essays about: "cryptography and network security"

Showing result 6 - 10 of 33 essays containing the words cryptography and network security.

  1. 6. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Vilhelmson Näf; [2021]
    Keywords : Post-Quantum Cryptography; Field Programmable Gate Array; Neural Network; Learning With Errors Rounding; Key Encapsulation Mechanism; Post-Quantum Cryptography; Field Programmable Gate Array; Neural Network; Learning With Errors Rounding; Key Encapsulation Mechanism;

    Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE

  2. 7. Parallel Aes diffusion inter block diffusion at bit level and compression

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Milap Shah; [2020]
    Keywords : cryptography; AES;

    Abstract : Information is an intelligent data through which knowledgeable and usable things can be convicted or interpreted in a proper manner. With the advancement of technology, transmission of information over the network has come a trend. This information must be transmitted securely over the network. READ MORE

  3. 8. Collaborative Drug Discovery with Blockchain Technology

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Christoffer Olsson; [2020]
    Keywords : Blockchain Cheminformatics immaterial rights cryptography; Technology and Engineering;

    Abstract : The cost of developing and researching novel molecular compounds in the pharmaceutical industry is very high today. If an actor accidentally releases too much information about a novel molecule to the public the molecule becomes prior art, and as an effect, can not be patented. READ MORE

  4. 9. Transaction synchronization and privacy aspect in blockchain decentralized applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Patarawan Ongkasuwan; [2020]
    Keywords : Blockchain; distributed database; distributed ledger; digital ledgers; centralized database; decentralized database; Ethereum; Blockchain synchronization; security-related; cryptocurrency; digital currency; transaction; user experience; privacy strategy; smart contract; risk; Blockchain; distribuerad storbok; digital ledbok; centraliserad databas; decentraliserad databas; Ethereum; Blockchain-synkronisering; säkerhetsrelaterad; cryptocurrency; digital valuta; transaktion; användarupplevelse; sekretessstrategi; smart kontrakt; risk;

    Abstract : The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. READ MORE

  5. 10. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : David Hilm; David Rahim; [2019]
    Keywords : Digital signature; Security; Two-factor Authentication; Authentication; Cryptography; YubiKey; JavaScript; WebCrypto; Universal Second Factor;

    Abstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE