Essays about: "master thesis for cryptography"

Showing result 1 - 5 of 11 essays containing the words master thesis for cryptography.

  1. 1. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Augustin Bariant; [2023]
    Keywords : Bitslicing; Cryptography; Whitebox; Compilation; Boolean circuits.; Parallélisation au bit; Cryptographie; Boîte blanche; Compilation; Circuits booléens.; Bitslicing; Kryptografi; Vit låda; Kompilering; Booleska kretsar.;

    Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE

  2. 2. Security Evaluation of Damper System’s Communication and Update Process : Threat modeling using vehicleLang and securiCAD

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Joar Ekelund; [2021]
    Keywords : Electronic Control Unit; Update; Automotive; Threat Modeling; vehicleLang; securiCAD; Styrenhet; Uppdatera; fordonsteknik; Hotmodellering; vehicleLang; securi- CAD;

    Abstract : As the automotive industry becomes increasingly reliant on digital systems it is of utmost importance that these systems are secure. Secure systems are of interest both for the general public as well as manufactures. READ MORE

  3. 3. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Sébastien Fuhrmann; Luis Cavo; [2018]
    Keywords : 3GPP; IoT; HLS; security; cryptography; AES; SNOW; ZUC; hardware; ASIC; confidentiality; integrity; cipher; Technology and Engineering;

    Abstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE

  4. 4. Distributed ledger technology in the capital market : Shared versus private information in a permissioned blockchain

    University essay from Uppsala universitet/Avdelningen för datalogi

    Author : Alessandro Piccolo; [2017]
    Keywords : Blockchain; Blockchain technology Distributed ledger; Capital market; Private transaction; Cryptography; Bitcoin; Ethereum; Quorum; Corda; Ripple;

    Abstract : This master thesis explores how blockchain technologies can be utilized within the financial sector with focus on how to store both private and public information on the blockchain. The capital market is looking into ways of cutting down administrative work through streamlining the financial process by using blockchain technologies. READ MORE

  5. 5. A Security and Privacy Audit of KakaoTalk’s End-to-End Encryption

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Dawin Schmidt; [2016]
    Keywords : Secure Messaging; End-to-end Encryption; Android Security; Secure Messaging; End-to-end Encryption; Android Security;

    Abstract : End-to-end encryption is becoming a standard feature in popular mobile chat appli-cations (apps) with millions of users. In the two years a number of leading chat apps have added end-end encryption features including LINE, KakaoTalk, Viber, Facebook Messenger, and WhatsApp. READ MORE