Essays about: "differential attack"

Showing result 1 - 5 of 9 essays containing the words differential attack.

  1. 1. Pseudomonas aeruginosa gene expression analysis using pangenome and PAO1 reference genomes

    University essay from Lunds universitet/Examensarbeten i bioinformatik

    Author : Yi Su; [2023]
    Keywords : Biology and Life Sciences;

    Abstract : Development in sequencing technologies has made the analyses of genetic material much more accessible. Processing sequenced data for an accurate analysis comes with its challenges, especially with the studies in microbial in clinical in vivo samples where difficulties in the collection of these samples for sequencing could lower the quality and contamination from the human host which might affect the accuracy of downstream analysis. READ MORE

  2. 2. How is Polly? Revisiting the Differential Attack on Polly Cracker after 20 years

    University essay from Lunds universitet/Matematikcentrum

    Author : Christoph Strobl; [2022]
    Keywords : Gröbner Bases; polly cracker; differential attack; asymmetric cryptography; multivariate cryptography; public-key cryptography; Mathematics and Statistics; Technology and Engineering;

    Abstract : För att skapa nya krypteringsalgoritmer är man alltid på jakt efter svårlösta matematiska problem. Men är alla problem lämpliga? Uppsatsen behandlar Gröbnerbaser över ändliga kroppar och visar att de är inte lämpliga för att bygga säkra krypteringsalgoritmer. READ MORE

  3. 3. Designing a Physical Unclonable Function for Cryptographic Hardware

    University essay from Linköpings universitet/Institutionen för teknik och naturvetenskap; Linköpings universitet/Tekniska fakulteten

    Author : Ludwig Bergfalck; Johannes Engström; [2021]
    Keywords : Hardware-based keyseed; Tamper protection; Physical Unclonable Function PUF ; Sensing mesh enclosure; Differential capacitance measurements;

    Abstract : Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. READ MORE

  4. 4. Randomly perturbing the bytecode of white box cryptography implementations in an attempt to mitigate side-channel attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Koski; [2020]
    Keywords : ;

    Abstract : This study takes one step further towards constructing a tool able to automatically amplify the security on your cryptographic implementations. In white box cryptography the encryption key is hidden inside the encryption algorithm out of plain sight. READ MORE

  5. 5. Young women’s perceptions on safety in public spaces of Mumbai: negotiating the risk of sexual harassment and challenging patriarchy by transcending victimhood

    University essay from Lunds universitet/Centrum för öst- och sydöstasienstudier

    Author : Anni-Elina Vänskä; [2019]
    Keywords : sexual violence; street harassment; Mumbai; public safety; patriarchy; gender roles; India; Social Sciences;

    Abstract : This thesis draws on ten in-depth interviews in order to analyze young and educated, middle-class women’s perceptions on public safety in Mumbai, regarding the risk of sexual harassment. It focuses on the ways these women negotiate with risk and the patriarchal norms of women’s appropriate behavior in public spaces, further, examines how these women address their oppression and act in order to empower themselves and other women. READ MORE