Essays about: "encryption keys"
Showing result 1 - 5 of 40 essays containing the words encryption keys.
-
1. Development of a QRNG front-end for shot noise measurement : analysis of quantum shot noise originating from photodiodes
University essay from Linköpings universitet/InformationskodningAbstract : As one of the more mature quantum technologies, quantum random number generators (QRNGs) fill an important role in producing secure and private keys for use in cryptogra- phy in e.g. quantum key distribution (QKD) systems. Many available QRNGs are expen- sive and optical QRNGs often require complex optical setups. READ MORE
-
2. Cost and efficiency comparison of Quantum Key Distribution schemes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The development of quantum computing exposes critical vulnerabilities in classical encryption systems. However, quantum computing also enables new methods of secure communication. Quantum key distribution (QKD) is one class of such methods. READ MORE
-
3. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability
University essay from KTH/Hälsoinformatik och logistikAbstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE
-
4. Anonymization of Sensitive Data through Cryptography
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE
-
5. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE