Sökning: "krypteringsalgoritmer"
Visar resultat 1 - 5 av 18 uppsatser innehållade ordet krypteringsalgoritmer.
1. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. LÄS MER
2. JackTheRidder: Idiotiskt eller en snilleblixt? : -Kryptering som kombinerar Collatz Conjecture med Caesarchiffer
Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Caesarcipher is a commonly known encryption method although it is known for being unsure, even long before computers were invented. Even though it is unsure it can still be used for cryptography, JackTheRidder consists of two main algorithms where one of them is based on the Caesarcipher. LÄS MER
3. How is Polly? Revisiting the Differential Attack on Polly Cracker after 20 years
Master-uppsats, Lunds universitet/MatematikcentrumSammanfattning : För att skapa nya krypteringsalgoritmer är man alltid på jakt efter svårlösta matematiska problem. Men är alla problem lämpliga? Uppsatsen behandlar Gröbnerbaser över ändliga kroppar och visar att de är inte lämpliga för att bygga säkra krypteringsalgoritmer. LÄS MER
4. Exploring Side-Channel Analysis Targeting FPGA Based RISC-V Architecture : Attempts at Performing Attacks in Preparation for Future PQC Algorithms
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quantum computers being built in the future. To counteract this, a process of developing quantum-resistant cryptographic algorithms is underway. This process also emphasizes the importance of protecting algorithms from Side-Channel Analysis (SCA). LÄS MER
5. Encrypted Documents Retrieval From The Cloud With Searchable Encryption : A Searchable Encryption Scheme Implementation
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Encrypting data is a solution to enhance the privacy and confidentiality of the data owners when outsourcing storage to cloud storage providers. However, using conventional encryption algorithms would render search queries based on the content of the data useless. LÄS MER