Essays about: "cryptography"

Showing result 21 - 25 of 186 essays containing the word cryptography.

  1. 21. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Chanvuth Chea; [2023]
    Keywords : ;

    Abstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE

  2. 22. Rethinking Execution Layer Front-Running Protection with Threshold Encryption : F3B: A Per-Transaction Front-Running Protection Architecture with Low-Latency Overhead

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyan Qu; [2023]
    Keywords : Blockchain; Front Running; Threshold Encryption; Blockchain; Front Running; Tröskelkryptering;

    Abstract : Blockchain is a decentralized and immutable append-only ledger. Smart contracts, the self-executing programs on blockchain, help build the Decentralized Finance (DeFi) markets. Front-running is the practice of benefiting from advanced knowledge of pending transactions. READ MORE

  3. 23. A deep learning based side-channel analysis of an FPGA implementation of Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yanning Ji; [2022]
    Keywords : Side-Channel Attack; Deep Learning; Post-quantum Cryptography; Sidokanalsattack; djupinlärning; postkvantkryptering;

    Abstract : In 2016, NIST started a post quantum cryptography (PQC) standardization project in response to the rapid development of quantum algorithms which break many public-key cryptographic schemes. As the project nears its end, it is necessary to assess the resistance of its finalists to side-channel attacks. READ MORE

  4. 24. Formal security verification of the Drone Remote Identification Protocol using Tamarin

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jakob Ahokas; Jonathan Persson; [2022]
    Keywords : Cybersecurity; Formal verification; Unmanned aircraft; Cryptography;

    Abstract : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. READ MORE

  5. 25. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE