Essays about: "cryptography"
Showing result 6 - 10 of 151 essays containing the word cryptography.
-
6. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE
-
7. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE
-
8. The Use of Management Control in Decentralized Autonomous Organizations : A descriptive case study on the use of management control in three Ethereum blockchain based DAOs
University essay from Linköpings universitet/Industriell ekonomiAbstract : Decentralized autonomous organizations, or DAOs, are spoken highly of in cryptocurrency spaces as a new way of organizing capital and labor. The basic concept is an organization with a shared vision or goal, where the participants and/or outside stakeholders own tokens that grant governing rights over resources through smart contracts. READ MORE
-
9. Fair Voting System for Permissionless Decentralized Autonomous Organizations
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The increasingly adapted technology called blockchain can be viewed as a distributed append-only time-stamped data structure which is made possible by a distributed peer-to-peer network. The network uses cryptography and different consensus mechanisms to ensure immutability, security, transparency, and speed in a decentralized fashion. READ MORE
-
10. A hashing algorithm based on a one-way function in the symmetric group Sn
University essay from Linnéuniversitetet/Institutionen för matematik (MA)Abstract : We have found an operation between permutations in the symmetric group Sn upon which we have experimentally derived results that can be linked to desirable properties in cryptography, mainly in the domain of one-way functions. From it, we have implemented a beta version of an algorithm for a hashing function by exploiting the operation’s low computational cost for speed and its properties for security. READ MORE