Search for dissertations about: "hardware cryptography"

Showing result 1 - 5 of 7 swedish dissertations containing the words hardware cryptography.

  1. 1. Decryption Failure Attacks on Post-Quantum Cryptography

    Author : Alexander Nilsson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Post-quantum cryptography; Code-based cryptography; Lattice-based cryptography; side-channel attack;

    Abstract : This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems. READ MORE

  2. 2. Two topics in cryptography : lattice problems and the security of protocols

    Author : Mårten Trolin; Johan Håstad; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Datalogi; Datalogi; Computer science; Datalogi;

    Abstract : In this thesis we present new results in two areas – cryptographic protocols and lattice problems. • We present a new protocol for electronic cash which is designed to function on hardware with limited computing power. The scheme has provable security properties and low computational requirements, but it still gives a fair amount of privacy. READ MORE

  3. 3. On the Design and Analysis of Stream Ciphers

    Author : Martin Hell; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; weak feedback polynomials; bit-search generator; self-shrinking generator; Achterbahn; Pomaranch; Grain-128; Grain; stream ciphers; cryptography; cryptanalysis; Informatics; systems theory; Informatik; systemteori;

    Abstract : This thesis presents new cryptanalysis results for several different stream cipher constructions. In addition, it also presents two new stream ciphers, both based on the same design principle. The first attack is a general attack targeting a nonlinear combiner. READ MORE

  4. 4. Side-Channel Analysis of Post-Quantum Cryptographic Algorithms

    Author : Kalle Ngo; Johnny Öberg; Ingo Sander; Elena Dubrova; Lejla Batina; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Post-quantum cryptography; Deep learning; LWE LWR-based KEM; Hardware security; Sidokanalsattack; Postkvantkryptering; Djupinlärning; LWE LWR-baserad KEM; Hårdvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : Public key cryptographic schemes used today rely on the intractability of certain mathematical problems that are known to be efficiently solvable with a large-scale quantum computer. To address the need for long-term security, in 2016 NIST started a project for standardizing post-quantum cryptography (PQC) primitives that rely on problems not known to be targets for a quantum computer, such as lattice problems. READ MORE

  5. 5. Deep Learning Side-Channel Attacks on Advanced Encryption Standard

    Author : Huanyu Wang; Elena Dubrova; Mark Smith; Francesco Regazzoni; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Deep learning; Advanced Encryption Standard; Hardware security; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. READ MORE