Essays about: "kryptografi"
Showing result 16 - 20 of 36 essays containing the word kryptografi.
-
16. On Asynchronous Group Key Agreement : Tripartite Asynchronous Ratchet Trees
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The subject of secure messaging has gained notable attention lately in the cryptographic community. For communications between two parties, paradigms such as the double ratchet, used in the Signal protocol, provide provably strong security guarantees such as forward secrecy and post-compromise security. READ MORE
-
17. Randomly perturbing the bytecode of white box cryptography implementations in an attempt to mitigate side-channel attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study takes one step further towards constructing a tool able to automatically amplify the security on your cryptographic implementations. In white box cryptography the encryption key is hidden inside the encryption algorithm out of plain sight. READ MORE
-
18. Enhancing Zigbee Security for Industrial Implementation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. READ MORE
-
19. Transaction synchronization and privacy aspect in blockchain decentralized applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. READ MORE
-
20. A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner
University essay from KTH/Hälsoinformatik och logistikAbstract : It is desirable for companies to be able to hide data inside videos to be able to find the source of any unauthorised sharing of a video. The hidden data (the payload) should damage the original data (the cover) by an as small amount as possible while also making it hard to remove the payload without also severely damaging the cover. READ MORE