Sökning: "asymmetrisk kryptografi"

Visar resultat 1 - 5 av 6 uppsatser innehållade orden asymmetrisk kryptografi.

  1. 1. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Tianpeng Ju; [2021]
    Nyckelord :Cryptography; neural network; asymmetric encryption; multiparty systems; Kryptografi; neuronnätverk; asymmetrisk kryptering; flerpartssystem;

    Sammanfattning : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. LÄS MER

  2. 2. Protection of Personal Data in Blockchain Technology : An investigation on the compatibility of the General Data Protection Regulation and the public blockchain

    Uppsats för yrkesexamina på avancerad nivå, Stockholms universitet/Institutet för rättsinformatik (IRI)

    Författare :Amelia Wallace; [2019]
    Nyckelord :General Data Protection Regulation; GDPR; Blockchain; Transparency; Personal Data; Dataskyddsförordningen; GDPR; Blockkedja; Transparens; Teknikneutralitet; Personuppgift;

    Sammanfattning : On 25 May 2018 the General Data Protection Regulation, GDPR, came into force in the EU. The regulation strengthened the rights of the data subjects’ in relation to the data controllers and processors and gave them more control over their personal data. LÄS MER

  3. 3. On Intersections of Algebraic Curves and Applications to Elliptic Curves

    Kandidat-uppsats, Lunds universitet/Matematik (naturvetenskapliga fakulteten)

    Författare :Karl Lindén; [2018]
    Nyckelord :Bezout s theorem; Max Noether s fundamental theorem; Pappus s theorem; Pascal s theorem; Chasles theorem; algebraic curves; elliptic curves; Mathematics and Statistics;

    Sammanfattning : In this thesis we state and give elementary proofs for some fundamental results about intersections of algebraic curves, namely Bezout's, Max Noether's, Pappus's, Pascal's and Chasles' theorems. Our main tools are linear algebra and basic ring theory. We conclude the thesis by applying the results to elliptic curves.. LÄS MER

  4. 4. Encrypting IMSI to improve privacy in 5G Networks

    Uppsats för yrkesexamina på avancerad nivå, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Enrique Cobo Jiménez; [2017]
    Nyckelord :5G; Privacy; IMSI; Security; ECIES; Android; 5G; Personlig Integritet; IMSI; Säkerhet; ECIES; Android;

    Sammanfattning : Nowadays, the long-term identifier of a user in a mobile network, namely International Mobile Subscriber Identity or IMSI, is transmitted in clear text over the radiointerface. Given that this interface is used as a shared medium, anyone with a radio transceiver and processing software can thus read such identifier. LÄS MER

  5. 5. Post-quantum Lattice-based Cryptography

    Master-uppsats, KTH/Matematik (Avd.)

    Författare :Rebecca Staffas; [2016]
    Nyckelord :;

    Sammanfattning : In a future full of quantum computers, new foundations for asymmetric cryptography are needed. We study the theoretical foundations for lattice-based cryptography as well as the current state on cryptographic attacks against them. We then turn our attention to signature systems and especially the system BLISS from 2013. LÄS MER