Essays about: "thesis on quantum cryptography"
Showing result 1 - 5 of 10 essays containing the words thesis on quantum cryptography.
-
1. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE
-
2. Sharing Quantum Resources Across a Metropolitan Network
University essay from KTH/Tillämpad fysikAbstract : Kvantsammanflätning har varit ett populärt ämne bland fysiker i snart 100 år då det tydligt belyser hur annorlunda kvantmekanikens värld är jämfört med den klassiska verklighet vi lever i. Med tiden har kvantsammanflätning blivit mer och mer välförstått och teknologier ämnade att utnyttja det har de senaste årtionden kommit allt närmare till industriell använding. READ MORE
-
3. Fabrication Development of InAs-Pb Nanodevices
University essay from Luleå tekniska universitet/Institutionen för teknikvetenskap och matematikAbstract : Research groups around the world are looking to develop a qubit protected from decoherence for achieving quantum advantage in computations. This would have huge impact on the modern world. The applications are many from drug development to cryptography and many more elds. READ MORE
-
4. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). READ MORE
-
5. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card
University essay from Linköpings universitet/InformationskodningAbstract : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. READ MORE