Search for dissertations about: "encryption"

Showing result 16 - 20 of 53 swedish dissertations containing the word encryption.

  1. 16. Robust location privacy

    Author : Per Hallgren; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : The Internet is in many ways both fascinating and yet also scary. For most people, a single commercial entity owns the power to disclose all their personal emails. Most commonly your emails are only disclosed to you and your correspondent, but the power to choose who sees these emails is in fact not yours. READ MORE

  2. 17. Aspects of Secure and Efficient Streaming and Collaboration

    Author : Gunnar Kreitz; Johan Håstad; Shai Halevi; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer science; Datalogi;

    Abstract : Research within the area of cryptography constitutes the core of this the- sis. In addition to cryptography, we also present results in peer-assisted streaming and web security. We present results on two specific cryptographic problems: broadcast encryption and secure multi-party computation. READ MORE

  3. 18. Efficient IoT Framework for Industrial Applications

    Author : Pablo Puñal Pereira; Jens Eliasson; Jerker Delsing; Luleå tekniska universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Industrial Electronics; Industriell elektronik;

    Abstract : The use of low-power wireless sensors and actuators with networking support in in-dustry has increased over the past decade. New generations of microcontrollers, new hardware for communication, and the use of standardized protocols such as the Internet Protocol have resulted in more possibilities for interoperability than ever before. READ MORE

  4. 19. Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

    Author : Aysajan Abidin; Jan-Åke Larsson; Viiveke Fåk; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; MATHEMATICS; MATEMATIK;

    Abstract : Authentication is an indispensable part of Quantum Cryptography, which is an unconditionally secure key distribution technique based on the laws of nature. Without proper authentication, Quantum Cryptography is vulnerable to “man-in-the-middle” attacks. READ MORE

  5. 20. Some Notes on Post-Quantum Cryptanalysis

    Author : Erik Mårtensson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cryptography; Post-quantum cryptography; LWE; BKW; Cryptanalysis; Lattice sieving; SVP; Lattice-based cryptography; Code-based cryptography;

    Abstract : Cryptography as it is used today relies on a foundational level on the assumptionthat either the Integer Factoring Problem (IFP) or the DiscreteLogarithm Problem (DLP) is computationally intractable. In the 1990s PeterShor developed a quantum algorithm that solves both problems in polynomialtime. READ MORE