• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 767
  • 132
  • 121
  • 68
  • 66
  • 36
  • 27
  • 24
  • 12
  • 12
  • 8
  • 7
  • 7
  • 7
  • 6
  • Tagged with
  • 1448
  • 513
  • 458
  • 312
  • 235
  • 230
  • 221
  • 192
  • 162
  • 156
  • 150
  • 144
  • 134
  • 133
  • 109
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Zero knowledge proofs and secret sharing problems /

Woll, Suzanne Heather, January 1988 (has links)
Thesis (Ph. D.)--University of Washington, 1988. / Vita. Includes bibliographical references (leaves [106]-113).
2

Tamper-resistant arithmetic for public-key cryptography

Gaubatz, Gunnar. January 2007 (has links)
Dissertation (Ph.D.)--Worcester Polytechnic Institute. / Keywords: Side Channel Attacks; Fault Attacks; Public-Key Cryptography; Error Detection; Error Detecting Codes. Includes bibliographical references (leaves 127-136).
3

Improved Cryptographic Processor Designs for Security in RFID and Other Ubiquitous Systems

Leinweber, Lawrence January 2009 (has links)
Thesis (Ph.D.)--Case Western Reserve University, 2009 / Department of Computer Engineering Abstract Title from PDF (viewed on 20 April 2009) Available online via the OhioLINK ETD Center
4

A distributed multiprecision cryptographic library design/

Hışıl, Hüseyin. Koltuksuz, Ahmet January 2005 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2005. / Keywords: Multiprecision number. Includes bibliographical references (leaves. 61-63).
5

Probability distributions over cryptographic protocols

Skaff, Stephanie J. C. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2009. / Thesis Advisor(s): Herzog, Jonathan. "June 2009." Description based on title screen as viewed on 14 July 2009. Author(s) subject terms: Automatic protocol generation; protocol analysis; security protocols; cryptographic protocols; key-exchange protocols; authentication protocols; protocol verification. Includes bibliographical references (p. 131-134). Also available in print.
6

An analysis of bent function properties using the transeunt triangle and the SRC-6 reconfigurable computer

Shafer, Jennifer L. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Butler,Jon T. ; Stanica, Pantelimon. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Bent Functions, Cryptography, Field Programmable Gate Array (FPGA), Reconfigurable Computer, Transeunt Triangle. Includes bibliographical references (p. 119-120). Also available in print.
7

Cube-type algebraic attacks on wireless encryption protocols

Petrakos, Nikolaos. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science and M.S. in Applied Mathematics)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Dinolt, George ; Michael, James Bret ; Stanica, Pantelimon. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Wireless Security, Cryptanalysis, Boolean Functions, Algebraic Attacks, Correlation Attacks, Cube Attacks, Bluetooth, Security Protocols. Includes bibliographical references (p. 77-80). Also available in print.
8

Characteristics of the binary decision diagrams of Boolean Bent Functions

Schafer, Neil Brendan. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Butler, Jon T. ; Stanica, Pantelimon. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Binary Decision Diagrams, Boolean Bent Functions, Homogeneous Functions, Disjoint Quadratic Functions, Symmetric Bent Functions, P-Equivalence, Minimization, Hardware Complexity, Circuit Complexity, Graphical Interface, Nonlinearity, Hamming Distance, Cryptography. Includes bibliographical references (p. 151-152). Also available in print.
9

Finding bent functions using genetic algorithms

Schneider, Stuart W. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Butler, Jon T. ; Stanica, Pantelimon. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Genetic Algorithm, Bent Functions, Reconfigurable Computer, Field Programmable Gate Array (FPGA), Cryptology. Includes bibliographical references (p. 177-178). Also available in print.
10

Analysis of a man-in-the-middle attack on the Diffie-Hellman key exchange protocol

Geary, Aaron C. January 2009 (has links) (PDF)
Thesis (M.S. in Applied Mathematics and M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Stanica, Pantelimon ; Kanevsky, Valery. "September 2009." Description based on title screen as viewed on November 6, 2009 Author(s) subject terms: Cryptography, Diffie-Hellman, Man-in-the-Middle Attack. Includes bibliographical references (p. 55-56). Also available in print.

Page generated in 0.0513 seconds