Search for dissertations about: "hardware cryptography"
Showing result 1 - 5 of 7 swedish dissertations containing the words hardware cryptography.
-
1. Decryption Failure Attacks on Post-Quantum Cryptography
Abstract : This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems. READ MORE
-
2. Two topics in cryptography : lattice problems and the security of protocols
Abstract : In this thesis we present new results in two areas – cryptographic protocols and lattice problems. • We present a new protocol for electronic cash which is designed to function on hardware with limited computing power. The scheme has provable security properties and low computational requirements, but it still gives a fair amount of privacy. READ MORE
-
3. On the Design and Analysis of Stream Ciphers
Abstract : This thesis presents new cryptanalysis results for several different stream cipher constructions. In addition, it also presents two new stream ciphers, both based on the same design principle. The first attack is a general attack targeting a nonlinear combiner. READ MORE
-
4. Side-Channel Analysis of Post-Quantum Cryptographic Algorithms
Abstract : Public key cryptographic schemes used today rely on the intractability of certain mathematical problems that are known to be efficiently solvable with a large-scale quantum computer. To address the need for long-term security, in 2016 NIST started a project for standardizing post-quantum cryptography (PQC) primitives that rely on problems not known to be targets for a quantum computer, such as lattice problems. READ MORE
-
5. Deep Learning Side-Channel Attacks on Advanced Encryption Standard
Abstract : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. READ MORE