Searched for: subject%3A%22Cryptography%22
(1 - 20 of 62)

Pages

document
Granneman, Erik (author)
The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...
master thesis 2022
document
Dzelme, Rihards (author)
We are at the beginning of the most significant societal change since the internet. We are transitioning from a 2-dimensional browser-based interaction to immersive 3-dimensional experiences. The metaverse is not a place or a destination but a state where technology and ecosystem are symbiotic. <br/>Digital Twins, interactive toolkits,...
master thesis 2022
document
Hondelink, Dieuwer (author)
Digital signatures are used everywhere around us. They are well-studied and have been standardized since 1994. In 2002, Johnson et al. introduced the notion of homomorphic digital signatures, allowing one to perform computations on signed data. These signatures are especially useful for linear network coding, a technique used to improve...
master thesis 2022
document
Ahvanooey, Milad Taleby (author), Zhu, Mark Xuefang (author), Mazurczyk, Wojciech (author), Li, Qianmu (author), Kilger, Max (author), Choo, Kim Kwang Raymond (author), Conti, M. (author)
While encryption can prevent unauthorized access to a secret message, it does not provide undetectability of covert communications over the public network. Implementing a highly latent data exchange, especially with low eavesdropping/discovery probability, is challenging for practical scenarios, such as social and political movements in...
journal article 2022
document
Mukhtar, Naila (author), Batina, Lejla (author), Picek, S. (author), Kong, Yinan (author)
Deep learning-based side-channel analysis performance heavily depends on the dataset size and the number of instances in each target class. Both small and imbalanced datasets might lead to unsuccessful side-channel attacks. The attack performance can be improved by generating traces synthetically from the obtained data instances instead of...
conference paper 2022
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, N. (author)
The computation power of quantum computers introduces new security threats in Public Key Infrastructure (PKI), a system used by many governments to secure their digital public services and communication. This calls for an inevitable need for governments to be quantum-safe (QS) by modifying their PKI systems to be resistant to the attacks of...
conference paper 2022
document
Li, H. (author), Mentens, Nele (author), Picek, S. (author)
This paper uses RISC-V vector extensions to speed up lattice-based operations in architectures based on HW/SW co-design. We analyze the structure of the number-theoretic transform (NTT), inverse NTT (INTT), and coefficient-wise multiplication (CWM) in CRYSTALS-Kyber, a lattice-based key encapsulation mechanism. We propose 12 vector extensions...
conference paper 2022
document
Vos, J.V. (author), Vos, D.A. (author), Erkin, Z. (author)
Cloud services are an essential part of our digital infrastructure as organizations outsource large amounts of data storage and computations. While organizations typically keep sensitive data in encrypted form at rest, they decrypt it when performing computations, leaving the cloud provider free to observe the data. Unfortunately, access to...
conference paper 2022
document
Yorgova, Radinka (author)
Code-Based Cryptography is a branch of the Post-Quantum Cryptography research area. As such, its focus is on developing algorithms that can be used in the current communication systems to secure them against an adversary powered in the (near) future by a quantum computer. A code-based type cryptosystem is a public key cryptosystem that is...
master thesis 2021
document
Saxena, Mudit (author)
As of 2021, the world economic forum deems cyber-security failures as one of the most potent threats to the world. According to a McAfee report, the cost of cybercrimes in 2020 reached nearly 1 trillion US dollars, which was around 50 percent more than what it was in 2018. Exacerbating the already mammoth financial implication of such a failure...
master thesis 2021
document
Veselka, David (author)
Implantable Medical Devices (IMDs) are deployed in patients to treat a range of medical conditions. Technological advancements have enabled manufacturers to fit IMDs with specialized hardware that accelerates compute-intensive medical therapies next to a software-run host processor. However, mostly hardware acceleration is found in the form of...
master thesis 2021
document
de Vries, Lisa (author)
We live in an online world: we date online, we do business online and we communicate online. To make sure this happens securely, almost all transferred data is encrypted by cryptosystems. This paper focuses on one of these: the knapsack cryptosystem of Merkle and Hellman, which relies on the hardness of solving the knapsack problem (1978). In...
bachelor thesis 2021
document
Adriaanse, P.E.A. (author)
With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a...
bachelor thesis 2021
document
Dekhuijzen, Lola (author)
The NIST PQC Standardization Process aims to find new cryptographic standards resistant to both classical and quantum computers. Several categories of cryptographic schemes are currently being evaluated by both NIST and the cryptographic community. Schemes are compared against one another with an emphasis on security, run-time performance, and...
bachelor thesis 2021
document
Mazzola, Giacomo (author)
In the last decade, development in quantum computing has threatened the security of current public-key cryptography. For this reason, the American National Institute of Standards and Technology (NIST) has organized a competition-like process to<br/>standardize new quantum-resistant public-key encryption and digital signature schemes. This...
bachelor thesis 2021
document
Feldman, Feldman (author), Cristea-Enache, Matei (author), Dekhuijzen, Lola (author), Mazzola, Giacomo (author)
As quantum-resistant cryptosystems will soon benecessary, the NIST has organized a contest aim-ing to its standardization. The proposed schemesmust be evaluated and thoroughly investigated tonotably ensure their security and compare their per-formance. This paper will explore various lattices-based (pqNTRUSign, BLISS, Dilithium, Falcon,qTesla)...
bachelor thesis 2021
document
van Tetering, Daphne (author)
The convenient service offered by credit cards and the technological advances in e-commerce have caused the number of online payment transactions to increase daily. With this rising number, the opportunity for fraudsters to obtain cardholder details via online credit card fraud has also increased. As a result, according to the European Central...
master thesis 2021
document
Vos, Jelle (author)
In our increasingly digital society, we are making a growing amount of data available to computers, networks and third parties. As a consequence, our sensitive data is in danger of getting exposed. The field of multi-party computation attempts to mitigate this by studying protocols that enable parties to perform their operations digitally,...
master thesis 2021
document
Carlet, Claude (author), Jakobovic, Domagoj (author), Picek, S. (author)
In the last few decades, evolutionary algorithms were successfully applied numerous times for creating Boolean functions with good cryptographic properties. Still, the applicability of such approaches was always limited as the cryptographic community knows how to construct suitable Boolean functions with deterministic algebraic constructions....
conference paper 2021
document
Ferrari, Riccardo M.G. (author), Teixeira, Andre M.H. (author)
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authentication schemes with weak cryptographic guarantees, we propose a watermarking approach to validate the data and its source. In particular, we propose a multiplicative scheme, where the sensor outputs are watermarked by a bank of filters, then...
journal article 2021
Searched for: subject%3A%22Cryptography%22
(1 - 20 of 62)

Pages