Spelling suggestions: "subject:"cryptography,"" "subject:"ryptography,""
441 |
Cryptography and its application to operating system security /Painchaud, Michelle. January 1981 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 1981. / Typescript. Includes bibliographical references.
|
442 |
Investigation into the impacts of migration to emergent NSA Suite B encryption standardsVenema, Jacob Paul. Shu, Jonathan Lee Yee. January 2009 (has links) (PDF)
Thesis (M.S. in Systems Technology (Command, Control & Communications (C3)))--Naval Postgraduate School, June 2009 by Jacob P. Venema. Thesis (M.S. in Software Engineering)--Naval Postgraduate School, June 2009 by Jonahan Lee Yee Shu. / Thesis Advisor(s): Fulp, John D. ; Riehle, Richard. "June 2009." Description based on title screen as viewed on July 14, 2009. Author(s) subject terms: elliptical curve cryptography, ECC, Rivest Shamir and Adleman, RSA, NSA Suite B, encryption, digital signature, key agreement, ECC migration, risk mitigation. Includes bibliographical references (p. 95-98). Also available in print.
|
443 |
The design of a test environment and its use in verification of a scalable modular multiplication and exponentiation /Khair, Elias. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2004. / Typescript (photocopy). Includes bibliographical references (leaves 53-54). Also available on the World Wide Web.
|
444 |
Secure distribution of open source information /Rogers, Jason Lee. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis advisor(s): George Dinolt. Includes bibliographical references (p. 57-59). Also available online.
|
445 |
Performance analysis of a scalable hardware FPGA Skein implementation /Schorr, Aric. January 2010 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2010. / Typescript. Includes bibliographical references (leaves 57-58).
|
446 |
Cube attacks on cryptographic hash functions /Lathrop, Joel. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 62-65).
|
447 |
Forward security from bilinear pairings signcryption and threshold signature /Chow, Sze-ming, Sherman. January 2004 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2005. / Title proper from title frame. Also available in printed format.
|
448 |
The wisdom of crowds as a model for trust and security in peer groupsWhitney, Justin D. January 2005 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: threshold cryptography; file sharing; security; peer to peer; p2p; trust. Includes bibliographical references. (p.84-87)
|
449 |
Anonymous T-out-of-N threshold signature schemesManeva-Jakimoska, Karolina. Burmester, Mike. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Mike Burmester, Florida State University,College of Arts amd Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 19, 2006). Document formatted into pages; contains viii, 40 pages. Includes bibliographical references.
|
450 |
Cryptography for ultra-low power devicesKaps, Jens-Peter E. January 2006 (has links)
Dissertation (Ph.D.)--Worcester Polytechnic Institute. / Keywords: rfid, wireless sensor networks, low energy, low power, cryptography. Includes bibliographical references (p.153-172).
|
Page generated in 0.3296 seconds