Sökning: "Advanced Encryption Standard"

Visar resultat 1 - 5 av 27 uppsatser innehållade orden Advanced Encryption Standard.

  1. 1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ossian Dillner; [2023]
    Nyckelord :Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Sammanfattning : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. LÄS MER

  2. 2. Anonymization of Sensitive Data through Cryptography

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Isac Holm; Johan Dahl; [2023]
    Nyckelord :Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Sammanfattning : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. LÄS MER

  3. 3. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Qiao Jin; [2022]
    Nyckelord :Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Sammanfattning : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. LÄS MER

  4. 4. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Xiaoyue Chen; [2022]
    Nyckelord :;

    Sammanfattning : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. LÄS MER

  5. 5. An Efficiency Evaluation of Far-Field Electromagnetic Deep Learning Side-Channel Attacks in Controlled Environments

    Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Signaler och system

    Författare :Gabriel Evensen; [2022]
    Nyckelord :SCA; DL-SCA; Side-Channel Attacks; Deep Learning Side-Channel Attacks; Far-Field Side-Channel Attacks;

    Sammanfattning : As more and more modern systems and products use built-in microcontrollers, hardware security becomes more important to protect against cyber-attacks. Internet of things devices, like Bluetooth devices, usually use an encryption algorithm to keep data safe from hackers. Advanced Encryption Standard (AES) is a commonly used encryption algorithm. LÄS MER