Searched for: subject%3A%22cryptography%22
(1 - 20 of 67)

Pages

document
Samardžić, Mariana (author)
The Machine Learning (ML) technology has taken the world by storm since it equipped the machines with previously unimaginable decision-making capabilities. However, building powerful ML models is not an easy task, but the demand for their utilization in different industries and areas of expertise is high. This was recognized by entities that...
master thesis 2023
document
van Barneveld, Lisa (author)
One of the first systems developed to provide online security is what is now known as RSA encryption. This method has been first published by Rivest, Shamir and Adleman in 1978. Even on this day, a modification of the first method of RSA encryption is being used and considered safe. This paper explores a number of mathematical structures and...
bachelor thesis 2023
document
Onkenhout, Job (author)
In 2019 a quantum computer performed a highly complex operation in 4 minutes, which would have taken the most powerful supercomputers of today around 10,000 years. Performing calculations unimaginably faster than is currently possible may bring great opportunities, but may implicate a threat to digital communications. Digital communication is...
master thesis 2023
document
Mariot, L. (author), Picek, S. (author), R Yorgova, R.A. (author)
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a McEliece-type cryptosystem using large minimum distance error-correcting codes derived from...
journal article 2023
document
Possati, L.M. (author)
This paper intends to contribute to the emerging literature on the ethical problems posed by quantum computing and quantum technologies in general. The key ethical questions are as follows: Does quantum computing pose new ethical problems, or are those raised by quantum computing just a different version of the same ethical problems raised by...
journal article 2023
document
Granneman, Erik (author)
The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...
master thesis 2022
document
Dzelme, Rihards (author)
We are at the beginning of the most significant societal change since the internet. We are transitioning from a 2-dimensional browser-based interaction to immersive 3-dimensional experiences. The metaverse is not a place or a destination but a state where technology and ecosystem are symbiotic. <br/>Digital Twins, interactive toolkits,...
master thesis 2022
document
Hondelink, Dieuwer (author)
Digital signatures are used everywhere around us. They are well-studied and have been standardized since 1994. In 2002, Johnson et al. introduced the notion of homomorphic digital signatures, allowing one to perform computations on signed data. These signatures are especially useful for linear network coding, a technique used to improve...
master thesis 2022
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, N. (author)
The computation power of quantum computers introduces new security threats in Public Key Infrastructure (PKI), a system used by many governments to secure their digital public services and communication. This calls for an inevitable need for governments to be quantum-safe (QS) by modifying their PKI systems to be resistant to the attacks of...
conference paper 2022
document
Li, H. (author), Mentens, Nele (author), Picek, S. (author)
This paper uses RISC-V vector extensions to speed up lattice-based operations in architectures based on HW/SW co-design. We analyze the structure of the number-theoretic transform (NTT), inverse NTT (INTT), and coefficient-wise multiplication (CWM) in CRYSTALS-Kyber, a lattice-based key encapsulation mechanism. We propose 12 vector extensions...
conference paper 2022
document
Vos, J.V. (author), Vos, D.A. (author), Erkin, Z. (author)
Cloud services are an essential part of our digital infrastructure as organizations outsource large amounts of data storage and computations. While organizations typically keep sensitive data in encrypted form at rest, they decrypt it when performing computations, leaving the cloud provider free to observe the data. Unfortunately, access to...
conference paper 2022
document
Ahvanooey, Milad Taleby (author), Zhu, Mark Xuefang (author), Mazurczyk, Wojciech (author), Li, Qianmu (author), Kilger, Max (author), Choo, Kim Kwang Raymond (author), Conti, M. (author)
While encryption can prevent unauthorized access to a secret message, it does not provide undetectability of covert communications over the public network. Implementing a highly latent data exchange, especially with low eavesdropping/discovery probability, is challenging for practical scenarios, such as social and political movements in...
journal article 2022
document
Mukhtar, Naila (author), Batina, Lejla (author), Picek, S. (author), Kong, Yinan (author)
Deep learning-based side-channel analysis performance heavily depends on the dataset size and the number of instances in each target class. Both small and imbalanced datasets might lead to unsuccessful side-channel attacks. The attack performance can be improved by generating traces synthetically from the obtained data instances instead of...
conference paper 2022
document
Yorgova, Radinka (author)
Code-Based Cryptography is a branch of the Post-Quantum Cryptography research area. As such, its focus is on developing algorithms that can be used in the current communication systems to secure them against an adversary powered in the (near) future by a quantum computer. A code-based type cryptosystem is a public key cryptosystem that is...
master thesis 2021
document
Saxena, Mudit (author)
As of 2021, the world economic forum deems cyber-security failures as one of the most potent threats to the world. According to a McAfee report, the cost of cybercrimes in 2020 reached nearly 1 trillion US dollars, which was around 50 percent more than what it was in 2018. Exacerbating the already mammoth financial implication of such a failure...
master thesis 2021
document
Veselka, David (author)
Implantable Medical Devices (IMDs) are deployed in patients to treat a range of medical conditions. Technological advancements have enabled manufacturers to fit IMDs with specialized hardware that accelerates compute-intensive medical therapies next to a software-run host processor. However, mostly hardware acceleration is found in the form of...
master thesis 2021
document
de Vries, Lisa (author)
We live in an online world: we date online, we do business online and we communicate online. To make sure this happens securely, almost all transferred data is encrypted by cryptosystems. This paper focuses on one of these: the knapsack cryptosystem of Merkle and Hellman, which relies on the hardness of solving the knapsack problem (1978). In...
bachelor thesis 2021
document
Adriaanse, P.E.A. (author)
With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a...
bachelor thesis 2021
document
Dekhuijzen, Lola (author)
The NIST PQC Standardization Process aims to find new cryptographic standards resistant to both classical and quantum computers. Several categories of cryptographic schemes are currently being evaluated by both NIST and the cryptographic community. Schemes are compared against one another with an emphasis on security, run-time performance, and...
bachelor thesis 2021
document
Mazzola, Giacomo (author)
In the last decade, development in quantum computing has threatened the security of current public-key cryptography. For this reason, the American National Institute of Standards and Technology (NIST) has organized a competition-like process to<br/>standardize new quantum-resistant public-key encryption and digital signature schemes. This...
bachelor thesis 2021
Searched for: subject%3A%22cryptography%22
(1 - 20 of 67)

Pages