Search for dissertations about: "research on cryptography"

Showing result 1 - 5 of 21 swedish dissertations containing the words research on cryptography.

  1. 1. Some Notes on Post-Quantum Cryptanalysis

    Author : Erik Mårtensson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cryptography; Post-quantum cryptography; LWE; BKW; Cryptanalysis; Lattice sieving; SVP; Lattice-based cryptography; Code-based cryptography;

    Abstract : Cryptography as it is used today relies on a foundational level on the assumptionthat either the Integer Factoring Problem (IFP) or the DiscreteLogarithm Problem (DLP) is computationally intractable. In the 1990s PeterShor developed a quantum algorithm that solves both problems in polynomialtime. READ MORE

  2. 2. Decryption Failure Attacks on Post-Quantum Cryptography

    Author : Alexander Nilsson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Post-quantum cryptography; Code-based cryptography; Lattice-based cryptography; side-channel attack;

    Abstract : This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems. READ MORE

  3. 3. On Some Symmetric Lightweight Cryptographic Designs

    Author : Martin Ågren; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Lightweight cryptography; integrity; authentication; symmetric cryptography; stream ciphers; block ciphers; Grain-128a; BEAN; KTANTAN; textsc{PRINTcipher}; FCSR combiner; related-key attack; linear cryptanalysis; linear correlations; invariant subspace attack.;

    Abstract : This dissertation presents cryptanalysis of several symmetric lightweight primitives, both stream ciphers and block ciphers. Further, some aspects of authentication in combination with a keystream generator is investigated, and a new member of the Grain family of stream ciphers, Grain-128a, with built-in support for authentication is presented. READ MORE

  4. 4. Some Words on Cryptanalysis of Stream Ciphers

    Author : Alexander Maximov; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; VMPC; Dragon; Grain; A5 1; SNOW 2.0; Scream; large distributions; correlation attacks; distinguishing attacks; algorithms; Cryptography; cryptanalysis; RC4; RC4A; Computer science; numerical analysis; systems; control; Datalogi; numerisk analys; system; kontroll;

    Abstract : In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudo-random sequence of symbols. READ MORE

  5. 5. Some Notes on Code-Based Cryptography

    Author : Carl Löndahl; Institutionen för elektro- och informationsteknik; []
    Keywords : ;

    Abstract : This thesis presents new cryptanalytic results in several areas of coding-based cryptography. In addition, we also investigate the possibility of using convolutional codes in code-based public-key cryptography. The first algorithm that we present is an information-set decoding algorithm, aiming towards the problem of decoding random linear codes. READ MORE