Essays about: "decryption"

Showing result 21 - 25 of 49 essays containing the word decryption.

  1. 21. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

    University essay from Linköpings universitet/Informationskodning

    Author : Hampus Eriksson; [2020]
    Keywords : post-quantum; cryptography; lattice-based cryptography; quantum-resistant; Kyber; constrained device; performance; evaluation; implementation;

    Abstract : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. READ MORE

  2. 22. Sort Merge Buckets: Optimizing Repeated Skewed Joins in Dataflow

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andrea Nardelli; [2019]
    Keywords : ;

    Abstract : The amount of data being generated and consumed by today’s systems and applications is staggering and increasing at a vertiginous rate. Many businesses and entities rely on the analysis and the insights gained from this data to deliver their service. READ MORE

  3. 23. Performance analysis of lattice based post-quantum secure cryptography with Java

    University essay from Umeå universitet/Institutionen för fysik

    Author : Alexander Johansson; [2019]
    Keywords : Cryptography; Post-quantum secure cryptography; Lattice-based cryptography; Learning with errors; Java;

    Abstract : Efficient quantum computers will break most of today’s public-key cryptosystems. Therefore, the National Institute of Standards and Technology (NIST) calls for proposals to standardise one or more quantum-secure cryptographic schemes. READ MORE

  4. 24. A Web-Based Application for the Secure Transfer of NGS data

    University essay from Uppsala universitet/Experimentell och klinisk onkologi

    Author : Ina Odén Österbo; [2019]
    Keywords : NGS; next generation sequencing; security; transfer; cryptography; AES; RSA;

    Abstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE

  5. 25. Security in Cloud Storage : A Suitable Security Algorithm for Data Protection

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Adeshola Oyesanya Oduyiga; [2018]
    Keywords : Security-in-cloud-storage; DES; 3DES; Blowfish; RC5; AES; Attacks-on-cloud-facilities; Data-Encryption-Standard; Data-protection.;

    Abstract : The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. READ MORE