Advanced search

Found 2 essays matching the above criteria.

  1. 1. Performance and Comparison of post-quantum Cryptographic Algorithms

    University essay from Linköpings universitet/Institutionen för systemteknik

    Author : Vladimir Valyukh; [2017]
    Keywords : post; quantum; resistant; cryptography; cryptographic; algorithms; performance; comparison; SIDH; NTRU; Frodo; NewHope; kvantresistenta; krypto; kryptoalgoritmer; prestanda; jämförelse; SIDH; NTRU; Frodo; NewHope;

    Abstract : Secure and reliable communication have always been critical part of todays infrastructure. Various asymmetric encryption schemes, such as RSA, have been used to achieve this goal. READ MORE

  2. 2. Encryption in Delocalized Access Systems

    University essay from Institutionen för teknik och naturvetenskap

    Author : Henrik Ahlström; Karl-Johan Skoglund; [2008]
    Keywords : Access systems; Cryptography; Public Key; Embedded system; Large integer arithmetic.;

    Abstract : The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems. READ MORE