Searched for: contributor%3A%22Chen%2C+H.+%28mentor%29%22
(1 - 4 of 4)
document
Thomas, Jeroen (author)
In a world where more data gets uploaded to the cloud, it is essential that the data gets stored securely. For users to keep search functionality, searchable symmetric encryption has been developed. SSE works by a user sending a token representing a keyword (or a range), after which the server returns the documents that match the keyword (or...
master thesis 2022
document
Lambregts, Steven (author)
Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, these leakages are caused by practical designs but are considered an...
master thesis 2022
document
Chatterjee, Agniv (author)
Blockchain networks are increasingly recognized as a disruptive technology across sectors such as online services, finance, supply chain, administration etc. They are underpinned by smart contracts which provide programmatic instruction for the blockchain to operate. A major obstacle in the widespread adoption of blockchain technology is the...
bachelor thesis 2022
document
Dekhuijzen, Lola (author)
The NIST PQC Standardization Process aims to find new cryptographic standards resistant to both classical and quantum computers. Several categories of cryptographic schemes are currently being evaluated by both NIST and the cryptographic community. Schemes are compared against one another with an emphasis on security, run-time performance, and...
bachelor thesis 2021
Searched for: contributor%3A%22Chen%2C+H.+%28mentor%29%22
(1 - 4 of 4)