Searched for: subject%3A%22Cryptography%22
(1 - 13 of 13)
document
van Barneveld, Lisa (author)
One of the first systems developed to provide online security is what is now known as RSA encryption. This method has been first published by Rivest, Shamir and Adleman in 1978. Even on this day, a modification of the first method of RSA encryption is being used and considered safe. This paper explores a number of mathematical structures and...
bachelor thesis 2023
document
Adriaanse, P.E.A. (author)
With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a...
bachelor thesis 2021
document
Mazzola, Giacomo (author)
In the last decade, development in quantum computing has threatened the security of current public-key cryptography. For this reason, the American National Institute of Standards and Technology (NIST) has organized a competition-like process to<br/>standardize new quantum-resistant public-key encryption and digital signature schemes. This...
bachelor thesis 2021
document
To, Seu Man (author)
The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital signs, making them valuable for use in the healthcare industry. Sharing this information with the user's healthcare provider has the potential to improve medical care by reducing medical misinformation....
master thesis 2020
document
Ribeiro, J.D. (author)
Most of themainstream cryptographic protocols that are used today rely on the assumption that the adversary has limited computational power, and that a given set of mathematical problems is hard to solve (on average), i.e. that there is no polynomial time algorithm that solves these problems. While these assumptions are reasonable for now they...
doctoral thesis 2020
document
van Houte, Roy (author)
Quantum coin flipping is a cryptographic primitive in which two or more parties that do not trust each other want establish a fair coin flip. These parties are not physically near each other and use quantum communication channels to interact. A quality of protocols is measured by the best possible cheating strategy, which is the solution of a...
master thesis 2020
document
Calamur Viravalli, Gouri (author)
Cryptography is the science of concealing messages, and it provides data security and privacy. A cipher is designed to be as secure as possible, to not be easily broken with the current availability of computational power in a reasonable amount of time. Various attacks have been discovered over time, and recently, the invariant subspace attack...
master thesis 2019
document
Nandakumar, Lakshminarayanan (author)
With the emergence of many modern automated systems around us that rely heavily on the private data collected from individuals, the problem of privacy-preserving data analysis is now gaining a significant attention in the field of systems and control. In this thesis, we investigate the privacy concerns of these systems arising in the process of...
master thesis 2018
document
Pan, Michel (author)
Digitalization of sensitive information such as bankaccounts enforces privacy to be ensured. Mathematical objects called elliptic curves have ensured exchange of this type of information due to their algebraic structure. The security relies on so called ECDLP and solving these types of problems, but there has yet to be found an efficient...
bachelor thesis 2018
document
Hoogland, Mathijs (author)
The role of Internet of Things (IoT) devices is becoming larger in our day-to-day life. More and more, devices are used to help with simple tasks in our lives. Little computers are installed in a large variety of consumer products and are often connected to the internet. The large increase of these “resource-constrained” devices that are...
master thesis 2018
document
Geneste, Ginger (author)
Modern Implantable Medical Devices (IMDs) are enabled to communicate with an external device trough wireless channels. The non-invasive method allow health-care practitioners to investigate the effectiveness of a treatment delivered by the IMD and tailor it specifically to the patients' needs. The wireless communication capability however, also...
master thesis 2017
document
Prahesa Kusuma Setia, Prahesa (author)
Current interconnected society provides us with numerous devices communicating with one another. Exchange of data thus become an integral part in our live. Data become valuable commodity in today's setting because of their usage by individual and other interested parties. Several parties may be interested in computing a function over their data...
master thesis 2017
document
Cartrysse, K. (author)
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a mobile software agent that performs a task on behalf of its user. The agent travels over the network and is executed at different locations of which beforehand it is not known whether or not these can be trusted. Because a mobile software agent...
doctoral thesis 2005
Searched for: subject%3A%22Cryptography%22
(1 - 13 of 13)