Essays about: "cryptography"

Showing result 1 - 5 of 122 essays containing the word cryptography.

  1. 1. Transaction synchronization and privacy aspect in blockchain decentralized applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Patarawan Ongkasuwan; [2020]
    Keywords : Blockchain; distributed database; distributed ledger; digital ledgers; centralized database; decentralized database; Ethereum; Blockchain synchronization; security-related; cryptocurrency; digital currency; transaction; user experience; privacy strategy; smart contract; risk; Blockchain; distribuerad storbok; digital ledbok; centraliserad databas; decentraliserad databas; Ethereum; Blockchain-synkronisering; säkerhetsrelaterad; cryptocurrency; digital valuta; transaktion; användarupplevelse; sekretessstrategi; smart kontrakt; risk;

    Abstract : The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. READ MORE

  2. 2. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  3. 3. On Pollard's rho method for solving the elliptic curve discrete logarithm problem

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Jenny Falk; [2019]
    Keywords : elliptic curves; Pollard s rho method; elliptic curve discrete logarithm problem; cryptography; adding walk; mixed walk; cycle-detecting algorithm; iterating function; random walk;

    Abstract :     Cryptosystems based on elliptic curves are in wide-spread use, they are considered secure because of the difficulty to solve the elliptic curve discrete logarithm problem. Pollard's rho method is regarded as the best method for attacking the logarithm problem to date, yet it is still not efficient enough to break an elliptic curve cryptosystem. READ MORE

  4. 4. A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol

    University essay from Linköpings universitet/Informationskodning

    Author : Markus Alvila; [2019]
    Keywords : post-quantum; resistant; cryptography; commutative; supersingular; isogeny; Diffie-Hellman; CSIDH; Signal; protocol; X3DH; Double Ratchet; Curve25519; performance; evaluation; CPU; profiling; Android;

    Abstract : The Signal protocol can be considered state-of-the-art when it comes to secure messaging, but advances in quantum computing stress the importance of finding post-quantum resistant alternatives to its asymmetric cryptographic primitives. The aim is to determine whether existing post-quantum cryptography can be used as a drop-in replacement for the public-key cryptography currently used in the Signal protocol and what the performance trade-offs may be. READ MORE

  5. 5. ASSESSMENT OF ROSLYN ANALYZERS FOR VISUAL STUDIO

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Jürgen Sundström; [2019]
    Keywords : ;

    Abstract : So‰ware security is an ever growing subject that is gett‹ing more important as we implement more soft‰ware into our daily lives. We want to protect our personal information and keep our privacy intact. READ MORE