Essays about: "cryptography in java"

Showing result 1 - 5 of 6 essays containing the words cryptography in java.

  1. 1. Performance analysis of lattice based post-quantum secure cryptography with Java

    University essay from Umeå universitet/Institutionen för fysik

    Author : Alexander Johansson; [2019]
    Keywords : Cryptography; Post-quantum secure cryptography; Lattice-based cryptography; Learning with errors; Java;

    Abstract : Efficient quantum computers will break most of today’s public-key cryptosystems. Therefore, the National Institute of Standards and Technology (NIST) calls for proposals to standardise one or more quantum-secure cryptographic schemes. READ MORE

  2. 2. A secure multi-party scheme with certificateless cryptography for secret key extraction

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dennis Fokin; [2018]
    Keywords : multi-party computation; secret sharing; certificateless cryptography; cryptography;

    Abstract : Many systems contain sensitive data such as user credentials used for authentication purposes. For large systems, a common approach is to store the data in a configuration file at a trusted third party. However, that would imply a single point of failure if an adversary gains access to the trusted party. READ MORE

  3. 3. Secure Bitcoin Wallet

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Sevil Guler; [2015]
    Keywords : Android; Security; Bitcoin; Mobile Payment; Java; Instant Messaging; Wallet; BTC; Virtual Currency; Cryptography; Push Notification; PKI; Shared Preference; SQLite; Security Architecture; Software Development; Mobile Development; Public Ledger; Miner;

    Abstract : Virtual currencies and mobile banking are technology advancements that are receiving increased attention in the global community because of their accessibility, convenience and speed. However, this popularity comes with growing security concerns, like increasing frequency of identity theft, leading to bigger problems which put user anonymity at risk. READ MORE

  4. 4. Investigation of cryptographic algorithms for the transfer of financial information

    University essay from Linnéuniversitetet/Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Mykola Martynenko; [2010]
    Keywords : encryption; cryptography; hashing; client; server; compressing; digital signature;

    Abstract : The purpose of the investigation is to determine the most effective solution, which allows safe storing and transmitting of financial information in terms of execution speed, resistance to hacking and ease of implementation. Research object is subject area related to the transfer of encrypted financial information like: encryption algorithms, algorithm of hashing functions, algorithm of electronic digital signature. READ MORE

  5. 5. Achieving Security in Messaging and Personal Content in Symbian Phones

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Ahmed Enany; [2007]
    Keywords : Security; Symbian; J2ME; authentication; confidentiality; non-repudiation; integrity; IBE; IBS; IBC; SMS; MMS;

    Abstract : This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. READ MORE