Essays about: "cryptography and network security"
Showing result 6 - 10 of 33 essays containing the words cryptography and network security.
-
6. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE
-
7. Parallel Aes diffusion inter block diffusion at bit level and compression
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Information is an intelligent data through which knowledgeable and usable things can be convicted or interpreted in a proper manner. With the advancement of technology, transmission of information over the network has come a trend. This information must be transmitted securely over the network. READ MORE
-
8. Collaborative Drug Discovery with Blockchain Technology
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The cost of developing and researching novel molecular compounds in the pharmaceutical industry is very high today. If an actor accidentally releases too much information about a novel molecule to the public the molecule becomes prior art, and as an effect, can not be patented. READ MORE
-
9. Transaction synchronization and privacy aspect in blockchain decentralized applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. READ MORE
-
10. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey
University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystemAbstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE