Sökning: "Cryptographic Hardware"

Visar resultat 1 - 5 av 37 uppsatser innehållade orden Cryptographic Hardware.

  1. 1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ossian Dillner; [2023]
    Nyckelord :Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Sammanfattning : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. LÄS MER

  2. 2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Faith Nnenna Onwumere; [2023]
    Nyckelord :IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Sammanfattning : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. LÄS MER

  3. 3. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    Uppsats för yrkesexamina på grundnivå, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Krister Georges; Per Jahnstedt; [2023]
    Nyckelord :NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Sammanfattning : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. LÄS MER

  4. 4. Säker nyckelhantering i webbläsaren

    Kandidat-uppsats, Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Författare :Daniel Engman; William Hagman; [2023]
    Nyckelord :WebAuthn; AWS; FIDO; FIDO2; prf; large blob; Knigtech; WebAuthn; AWS; FIDO; FIDO2; prf; large blob; Knigtech;

    Sammanfattning : Idag används vanligtvis lösenord som autentiseringsmetod i moderna applikationer. Men allt fler företag och applikationer övergår från denna metod och i stället använda krypterade nycklar och certifikat för att öka säkerheten. LÄS MER

  5. 5. A deep learning based side-channel analysis of an FPGA implementation of Saber

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yanning Ji; [2022]
    Nyckelord :Side-Channel Attack; Deep Learning; Post-quantum Cryptography; Sidokanalsattack; djupinlärning; postkvantkryptering;

    Sammanfattning : In 2016, NIST started a post quantum cryptography (PQC) standardization project in response to the rapid development of quantum algorithms which break many public-key cryptographic schemes. As the project nears its end, it is necessary to assess the resistance of its finalists to side-channel attacks. LÄS MER