Searched for: subject%3A%22encryption%22
(1 - 8 of 8)
document
Granneman, Erik (author)
The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...
master thesis 2022
document
Noordam, Leon (author)
Modular exponentiation is the basis needed to perform RSA encryption and decryption. Execution of 4096-bit modular exponentiation using an embedded system requires many arithmetic operations. This work aims to improve the performance of modular exponentiation for an existing FPGA platform containing a soft core RISC-V processor. The solution is...
master thesis 2019
document
van Aanholt, Levi (author), aan de Wiel, Christian (author), Yeh, Haoming (author)
During the Bachelor End Project we have been tasked with developing a web portal for the Exposure Render. The Exposure Render is able to interactively visualize volumetric data to photo realistic images. This means that the web portal would allow users to view a visualization of their medical data.<br/>The requirements of the web portal have...
bachelor thesis 2017
document
Van Engelenburg, S.H. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author)
Information sharing between businesses and government agencies is of vital importance, yet business are often reluctant to share information, e.g. as it might be misused. Taking this into account is however often overlooked in the design of software architectures. In this research we apply a design science approach to develop an software...
book chapter 2016
document
Zeilemaker, N.S.M. (author)
P2P networks employ the resources available at peers to reduce the load at, or eliminate the need for a server. In order to achieve these goals, protocols are implemented which aim to allow peers to collaborate efficiently. However, these same protocols can make peers an easy target, as their willingness to collaborate can be susceptible to...
doctoral thesis 2015
document
Aué, J. (author), Van Staveren, R.H. (author)
Medical doctors and researchers have to send medical image files to each other. This may be for a consult, because a patient is treated by a different doctor or because the files are to be used for research. The files contain personal health information, and privacy rules have to be satisfied before the files may be sent. To securely send the...
bachelor thesis 2014
document
Strydis, C. (author)
HEALTHCARE in the 21st century is changing rapidly. In advanced countries, in particular, healthcare is moving from a public to a more personalized nature. However, the costs of healthcare worldwide are increasing every year. Better use of technology can and should be used to get control of these costs. At the same time, implants have clearly...
doctoral thesis 2011
document
Strydis, C. (author), Gaydadjiev, G.N. (author)
A more structured and streamlined design of implants is nowadays possible. In this paper we focus on implant processors located in the heart of implantable systems. We present a real and representative biomedical-application scenario where such a new processor can be employed. Based on a suitably selected processor simulator, various operational...
journal article 2008
Searched for: subject%3A%22encryption%22
(1 - 8 of 8)