• On Fully Homomorphic Encryption 

      Fauzi, Prastudy (Master thesis, 2012)
      Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and perform arbitrary operations on this data efficiently.The data remains encrypted throughout, but the operations can be done ...
    • On the Development and Standardisation of Post-Quantum Cryptography - A Synopsis of the NIST Post-Quantum Cryptography Standardisation Process, its Incentives, and Submissions 

      Legernæs, Maja Worren (Master thesis, 2018)
      Due to developments within the field of quantum computers, the need for developing and implementing quantum-resistant cryptographic algorithms has become more urgent. Using such computers, many of today's most prominent ...
    • Password-based digital signatures 

      Sivagnanasuntharam, Sangeepan (Master thesis, 2013)
      This thesis is about implementing a digital signature scheme proposed by associate professor Kristian Gjøsteen and Oystein Thuen.The thesis explains the implementation, the challenges met and a security assessment of the ...
    • Performance analysis and enhancement of the iSHAKE algorithm 

      Perez Crespo, Jaime (Master thesis, 2017)
      In the era of the Big Data, immense amounts of data are being generated and processed every second. Research facilities like the European Large Hadron Collider (LHC) in Geneva generate massive amounts of information every ...
    • Performance of hidden services in Tor 

      Solberg, Petter; Bezem, Bram (Master thesis, 2013)
      In this thesis we will provide an overview of the Tor hidden service protocol. We will demonstrate the steps of setting up Tor hidden services and a private Tor network for testing purposes. The performance of the hidden ...
    • Pi-Cipher: Authenticated Encryption for Big Data 

      Gligoroski, Danilo; Mihajloska, Hristina; Samardjiska, Simona; Jacobsen, Håkon; Jensen, Rune Erlend; El-Hadedy, Mohamed (Chapter, 2014)
      In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, ...
    • Post Quantum Cryptography with random split of St-Gen codes 

      Shehata, Samy Saad Samy (Master thesis, 2017)
      Most current standardized cryptographic systems rely on the discrete logarithm problem and integer factorization problem for security. While these problems are considered hard using classical computers, quantum computers ...
    • Private Blockchain system for international currency exchange and hedging 

      Andersen, Kristoffer Alvern (Master thesis, 2018)
      This master thesis designs a system that utilizes Blockchain technology in international currency exchange transactions, thereby act as a currency exchange interface among private parties and companies, to enable faster ...
    • Procedures and Tools to Reset or Recover the Administrator Password on Popular Operating Systems 

      Blakstad, Jørgen Wahl; Nergård, Rune Walsø (Master thesis, 2009)
      Unauthorized access to computers and theft of proprietary information are two problems leading to large economical losses for organizations around the world. Thousands of laptops often containing vital information are lost ...
    • Protocols for toll road systems 

      Fjellby, Per Kristian J (Master thesis, 2013)
      A problem in a tolling system like AutoPASS is the number of unidentified passages due to unreadable license plates. As a consequence money is lost for the toll road companies. A scheme is proposed that uses anonymous ...
    • Reliable and secure storage with Erasure Codes for OpenStack-Swift in PyECLib 

      Chang, Cheng (Master thesis, 2016)
      In the last decade, cloud storage systems has experienced a rapid growth to account for an important part of cloud-based services. Among them, OpenStack Swift is a open source software to implement an object storage system. ...
    • Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform 

      El-Hadedy, Mohamed; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein J. (Chapter, 2010)
      This paper presents the design and analysis of an area efficient Blue Midnight Wish compression function with digest size of 256 bits (BMW-256) on FPGA platforms. The proposed architecture achieves significant improvements ...
    • RFID implementation and performance analysis of a short MQQ digital signature 

      Soomro, Kamran Saleem (Master thesis, 2010)
      Contactless smart cards (RFID cards) have been widely used for manyapplications such as epassport, ebanking, transit fare payment and accesscontrol systems. These cards have limited resources for performing arithmeticand ...
    • SDN - a crucial security component towards 5G 

      Førland, Mathias Kjølleberg (Master thesis, 2019)
      Den femte generasjonen (5G) av mobilkommunikasjonssystemer forventes å bli kommersielt lansert i 2020 og forutses som en banebrytende teknologi som blant annet muliggjør brukstilfeller for kritisk infrastruktur som autonome ...
    • Secure Communication with WireGuard – VPN-as-a-Service in Beyond 5G 

      Kielland, Sondre Sørensen (Master thesis, 2022)
      Innføring av skivedeling i 5G nettverk åpner for at vertikale virksomheter kan utvikle og benytte sine tjenester ved siden av hverandre i telenett. Sammenliknet med tidligere generasjons mobilnettverk, søker 5G å kunne ...
    • Secure data aggregation for wireless sensor network 

      Tran-Thi-Thuy, Trang (Master thesis, 2010)
      Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or ...
    • Secure Service Implementation with Slice Isolation and WireGuard 

      Kielland, Sondre; Esmaeily, Ali; Kralevska, Katina; Gligoroski, Danilo (Chapter, 2022)
      Network slicing enables the provision of services for different verticals over a shared infrastructure. Nevertheless, security is still one of the main challenges when sharing resources. In this paper, we study how WireGuard ...
    • Securing Cloud Storage Service 

      Zapolskas, Vytautas (Master thesis, 2012)
      Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services becomes increasingly important, because for many ...
    • Securing Information Flow in Loosely-Coupled Systems 

      Zvirblis, Linas (Master thesis, 2011)
      Information-flow control is an important element in computer system security, and there has been significant work done in the field by Denning, Volpano, and others. However, most of the work deals with information-flow ...
    • Securing the boot process of embedded Linux systems 

      Belay, Nahom Aseged (Master thesis, 2022)
      I løpet av de siste årene har antallet tilknyttede enheter som utgjør Internet of Things økt dramatisk, og lite tyder på at denne utviklingen er i ferd med å snu. Ettersom disse enhetene utgjør en vesentlig del av kritiske ...