Essays about: "symmetric encryption"

Showing result 1 - 5 of 24 essays containing the words symmetric encryption.

  1. 1. Anonymization of Sensitive Data through Cryptography

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isac Holm; Johan Dahl; [2023]
    Keywords : Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE

  2. 2. Rethinking Execution Layer Front-Running Protection with Threshold Encryption : F3B: A Per-Transaction Front-Running Protection Architecture with Low-Latency Overhead

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyan Qu; [2023]
    Keywords : Blockchain; Front Running; Threshold Encryption; Blockchain; Front Running; Tröskelkryptering;

    Abstract : Blockchain is a decentralized and immutable append-only ledger. Smart contracts, the self-executing programs on blockchain, help build the Decentralized Finance (DeFi) markets. Front-running is the practice of benefiting from advanced knowledge of pending transactions. READ MORE

  3. 3. Securing Electronic Health Records : A Blockchain Solution

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Oscar Andersson; [2021]
    Keywords : Electronic health records; blockchain; ethereum; smart contracts; interplanetary file system;

    Abstract : Blockchain is an interesting technology, with different projects developing every day since it first gained its light back in 2008. More and more research finds blockchain useful in several different sectors. One of the sectors being healthcare, specifically for electronic health records (EHR). READ MORE

  4. 4. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tianpeng Ju; [2021]
    Keywords : Cryptography; neural network; asymmetric encryption; multiparty systems; Kryptografi; neuronnätverk; asymmetrisk kryptering; flerpartssystem;

    Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE

  5. 5. Client controlled, secure endpointto-endpoint storage in the cloud

    University essay from KTH/Hälsoinformatik och logistik

    Author : Maximilian Michelson; [2020]
    Keywords : ;

    Abstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE