Advanced search
Showing result 16 - 20 of 186 essays matching the above criteria.
-
16. Anonymization of Sensitive Data through Cryptography
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE
-
17. Data mining in healthcare : A security and privacy perspective
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Data mining has become an essential tool in various domains, including healthcare, for finding patterns and relationships in large datasets to solve business issues. However, given the sensitivity of healthcare data, safeguarding confidentiality and privacy to protect patient information is highly prioritized. READ MORE
-
18. The Solitaire algorithm and the key stream analysis
University essay from Linnéuniversitetet/Institutionen för matematik (MA)Abstract : The operation of the Solitaire algorithm is based on a deck of cards, including two different jokers. We use the computer to simulate the Solitaire algorithm and analyze the key stream which is generated by the algorithm.We mainly analyze the maximum cycle length of the key stream and doNIST test. . READ MORE
-
19. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE
-
20. Experimental Evaluation of Kleptographic Backdoors in LWE-based KEMs
University essay from Linköpings universitet/Institutionen för systemteknikAbstract : This work aims to provide an experimental evaluation of two kleptographic backdoors. The backdoors target the key generation step in Learning with Errors-based crypto algorithms and exploit freedom in choosing the seeds for the algorithm. READ MORE