Searched for: subject%3A%22Cryptography%22
(1 - 20 of 72)

Pages

document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
By utilizing the properties of quantum mechanics, quantum computers have the potential to factor a key pair of a large prime number and break some of the core cryptographic primitives that most information infrastructures depend on. This means that today's widely used cryptographic algorithms can soon become unsafe and need to be modified...
journal article 2024
document
Li, T. (author), Xu, L. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
With the fast development of e-commerce, there is a higher demand for timely delivery. Logistic companies want to send receivers a more accurate arrival prediction to improve customer satisfaction and lower customer retention costs. One approach is to share (near) real-time location data with recipients, but this also introduces privacy and...
conference paper 2024
document
Najm, Z. (author)
doctoral thesis 2023
document
Samardžić, Mariana (author)
The Machine Learning (ML) technology has taken the world by storm since it equipped the machines with previously unimaginable decision-making capabilities. However, building powerful ML models is not an easy task, but the demand for their utilization in different industries and areas of expertise is high. This was recognized by entities that...
master thesis 2023
document
van Barneveld, Lisa (author)
One of the first systems developed to provide online security is what is now known as RSA encryption. This method has been first published by Rivest, Shamir and Adleman in 1978. Even on this day, a modification of the first method of RSA encryption is being used and considered safe. This paper explores a number of mathematical structures and...
bachelor thesis 2023
document
Onkenhout, Job (author)
In 2019 a quantum computer performed a highly complex operation in 4 minutes, which would have taken the most powerful supercomputers of today around 10,000 years. Performing calculations unimaginably faster than is currently possible may bring great opportunities, but may implicate a threat to digital communications. Digital communication is...
master thesis 2023
document
Mariot, L. (author), Picek, S. (author), R Yorgova, R.A. (author)
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a McEliece-type cryptosystem using large minimum distance error-correcting codes derived from...
journal article 2023
document
Wang, Wei (author), Liu, Dongli (author), Xu, Peng (author), Yang, Laurence Tianruo (author), Liang, K. (author)
It has become a trend for clients to outsource their encrypted databases to remote servers and then leverage the Searchable Encryption technique to perform secure data retrieval. However, the method has yet to be considered a crucial need for replication on searchable encrypted data. It calls for challenging works on Dynamic Searchable...
journal article 2023
document
Possati, L.M. (author)
This paper intends to contribute to the emerging literature on the ethical problems posed by quantum computing and quantum technologies in general. The key ethical questions are as follows: Does quantum computing pose new ethical problems, or are those raised by quantum computing just a different version of the same ethical problems raised by...
journal article 2023
document
Aljuffri, A.A.M. (author), Saxena, Mudit (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Security is one of the most important features that a system must provide. Depending on the application of the target device, different threats should be considered at design time. However, the attack space is vast. Hence, it is difficult to decide what components to protect, what level of protection they require and how efficient they are in...
conference paper 2023
document
Granneman, Erik (author)
The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...
master thesis 2022
document
Dzelme, Rihards (author)
We are at the beginning of the most significant societal change since the internet. We are transitioning from a 2-dimensional browser-based interaction to immersive 3-dimensional experiences. The metaverse is not a place or a destination but a state where technology and ecosystem are symbiotic. <br/>Digital Twins, interactive toolkits,...
master thesis 2022
document
Hondelink, Dieuwer (author)
Digital signatures are used everywhere around us. They are well-studied and have been standardized since 1994. In 2002, Johnson et al. introduced the notion of homomorphic digital signatures, allowing one to perform computations on signed data. These signatures are especially useful for linear network coding, a technique used to improve...
master thesis 2022
document
Li, H. (author), Mentens, Nele (author), Picek, S. (author)
This paper uses RISC-V vector extensions to speed up lattice-based operations in architectures based on HW/SW co-design. We analyze the structure of the number-theoretic transform (NTT), inverse NTT (INTT), and coefficient-wise multiplication (CWM) in CRYSTALS-Kyber, a lattice-based key encapsulation mechanism. We propose 12 vector extensions...
conference paper 2022
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
The computation power of quantum computers introduces new security threats in Public Key Infrastructure (PKI), a system used by many governments to secure their digital public services and communication. This calls for an inevitable need for governments to be quantum-safe (QS) by modifying their PKI systems to be resistant to the attacks of...
conference paper 2022
document
Vos, J.V. (author), Vos, D.A. (author), Erkin, Z. (author)
Cloud services are an essential part of our digital infrastructure as organizations outsource large amounts of data storage and computations. While organizations typically keep sensitive data in encrypted form at rest, they decrypt it when performing computations, leaving the cloud provider free to observe the data. Unfortunately, access to...
conference paper 2022
document
Ahvanooey, Milad Taleby (author), Zhu, Mark Xuefang (author), Mazurczyk, Wojciech (author), Li, Qianmu (author), Kilger, Max (author), Choo, Kim Kwang Raymond (author), Conti, M. (author)
While encryption can prevent unauthorized access to a secret message, it does not provide undetectability of covert communications over the public network. Implementing a highly latent data exchange, especially with low eavesdropping/discovery probability, is challenging for practical scenarios, such as social and political movements in...
journal article 2022
document
Mukhtar, Naila (author), Batina, Lejla (author), Picek, S. (author), Kong, Yinan (author)
Deep learning-based side-channel analysis performance heavily depends on the dataset size and the number of instances in each target class. Both small and imbalanced datasets might lead to unsuccessful side-channel attacks. The attack performance can be improved by generating traces synthetically from the obtained data instances instead of...
conference paper 2022
document
Yorgova, Radinka (author)
Code-Based Cryptography is a branch of the Post-Quantum Cryptography research area. As such, its focus is on developing algorithms that can be used in the current communication systems to secure them against an adversary powered in the (near) future by a quantum computer. A code-based type cryptosystem is a public key cryptosystem that is...
master thesis 2021
document
Saxena, Mudit (author)
As of 2021, the world economic forum deems cyber-security failures as one of the most potent threats to the world. According to a McAfee report, the cost of cybercrimes in 2020 reached nearly 1 trillion US dollars, which was around 50 percent more than what it was in 2018. Exacerbating the already mammoth financial implication of such a failure...
master thesis 2021
Searched for: subject%3A%22Cryptography%22
(1 - 20 of 72)

Pages