Essays about: "hemligheter"
Showing result 1 - 5 of 8 essays containing the word hemligheter.
-
1. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. READ MORE
-
2. Reverse Engineering of Deep Learning Models by Side-Channel Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. READ MORE
-
3. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE
-
4. Investigation of Impact Parameter Profiles in Multi-Parton Interactions
University essay from Lunds universitet/Teoretisk partikelfysik - Geonomgår omorganisationAbstract : The purpose of this thesis was to implement an alternative method to calculate the overlap function, which describe to what extent two protons overlap with each other spatially, into PYTHIA8 in order to determine how it affected the average number of multiparton interactions. The new overlap function is based on an explicit impact parameter picture, whereas PYTHIA8s overlap function uses an implicit impact parameter picture. READ MORE
-
5. Automatic secret synchronisation across heterogeneous IT environments
University essay from KTH/Hälsoinformatik och logistikAbstract : Following circumstances such as mergers and acquisitions, the IT systemsassociated with the participating organisations may need to share access towardsservices and systems with eachother. Access towards systems and services is oftencontrolled using secret information such as passwords or keys. READ MORE