Advanced search

Showing result 1 - 5 of 13 essays matching the above criteria.

  1. 1. The Effect of Noise Levels on the Performance of Shor’s Algorithm

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Höstedt; Tobias Ljunggren; [2023]
    Keywords : Bachelor’s thesis; Quantum Computing; Shor’s algorithm; Noise; Cryptography; Qiskit; Kandidatexamensarbete; Kvantdatorer; Shors algorithm; Brus; Kryptografi; Qiskit;

    Abstract : Advanced enough quantum computers promise to revolutionise fields such as cryptography, drug discovery and simulations of complex systems. Quantum computers are built on qubits which are fragile and susceptible to error-inducing interference, which is called noise. READ MORE

  2. 2. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Linus Backlund; [2023]
    Keywords : Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE

  3. 3. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kei Duke-Bergman; Alexander Huynh; [2023]
    Keywords : Bachelor’s thesis; FPGA; SHA; Cryptography; Kandidatexamensarbete; FPGA; SHA; Kryptografi;

    Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE

  4. 4. A deep learning based side-channel analysis of an FPGA implementation of Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yanning Ji; [2022]
    Keywords : Side-Channel Attack; Deep Learning; Post-quantum Cryptography; Sidokanalsattack; djupinlärning; postkvantkryptering;

    Abstract : In 2016, NIST started a post quantum cryptography (PQC) standardization project in response to the rapid development of quantum algorithms which break many public-key cryptographic schemes. As the project nears its end, it is necessary to assess the resistance of its finalists to side-channel attacks. READ MORE

  5. 5. Sharing Quantum Resources Across a Metropolitan Network

    University essay from KTH/Tillämpad fysik

    Author : Martin Carlnäs; [2022]
    Keywords : QKD; Entanglement; SNSPD; Quantum Dot; Exciton; Biexciton; QKD; Kvantsammanflätning; SNSPD; Kvant Prick; Exciton; Biexciton;

    Abstract : Kvantsammanflätning har varit ett populärt ämne bland fysiker i snart 100 år då det tydligt belyser hur annorlunda kvantmekanikens värld är jämfört med den klassiska verklighet vi lever i. Med tiden har kvantsammanflätning blivit mer och mer välförstått och teknologier ämnade att utnyttja det har de senaste årtionden kommit allt närmare till industriell använding. READ MORE