Essays about: "decryption"

Showing result 11 - 15 of 49 essays containing the word decryption.

  1. 11. Homomorphic Encryption for Audio Conferencing

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Herman Nordin; Ebba Lindström; [2022]
    Keywords : Homomorphic encryption; VoIP; security; audio conferencing; cryptography;

    Abstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE

  2. 12. Evaluating Transcription of Ciphers with Few-Shot Learning

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Nikolina Milioni; [2022]
    Keywords : Ciphers; Automatic Transcription; Decrypt project; Few-shot learning;

    Abstract : Ciphers are encrypted documents created to hide their content from those who were not the receivers of the message. Different types of symbols, such as zodiac signs, alchemical symbols, alphabet letters or digits are exploited to compose the encrypted text which needs to be decrypted to gain access to the content of the documents. READ MORE

  3. 13. Multipath transport protocol offloading

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013); Karlstads universitet/Avdelningen för datavetenskap

    Author : Rebecka Alfredsson; [2022]
    Keywords : QUIC; multipath; hardware offloading; DPDK; crypto; DPU;

    Abstract : Recently, we have seen an evolution of programmable network devices, where it is possible to customize packet processing inside the data plane at an unprecedented level. This is in contrast to traditional approaches, where networking device functionality is fixed and defined by the ASIC and customers need to wait possibly years before the vendors release new versions that add features required by customers. READ MORE

  4. 14. Security Evaluation of Damper System’s Communication and Update Process : Threat modeling using vehicleLang and securiCAD

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Joar Ekelund; [2021]
    Keywords : Electronic Control Unit; Update; Automotive; Threat Modeling; vehicleLang; securiCAD; Styrenhet; Uppdatera; fordonsteknik; Hotmodellering; vehicleLang; securi- CAD;

    Abstract : As the automotive industry becomes increasingly reliant on digital systems it is of utmost importance that these systems are secure. Secure systems are of interest both for the general public as well as manufactures. READ MORE

  5. 15. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhe Wang; [2021]
    Keywords : Intra-server load balancing; QUIC protocol; Connection migration; BPF; Connection management; Lastbalansering mellan servern; QUIC protokoll; Anslutningsmigrering; BPF; Anslutningshantering;

    Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE