Spelling suggestions: "subject:"cryptography."" "subject:"ryptography.""
231 |
Rijndael Circuit Level CryptanalysisPehlivanoglu, Serdar. January 2005 (has links)
Thesis (M.S.) -- Worcester Polytechnic Institute. / Keywords: private-key cryptography; Advanced Encryption Standard; K-secure; hermetic; block cipher; circuit complexity. Includes bibliographical references (p. 75-79).
|
232 |
Genetic algorithms in cryptography /Delman, Bethany. January 2003 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2004. / Typescript. Includes bibliographical references (leaves 85-87).
|
233 |
Optimizing scalar multiplication for Koblitz curves using hybrid FPGAs /Głuszek, Gregory A. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 93-95).
|
234 |
Firewall resistance to metaferography in network communications /Savacool, Richard. January 2010 (has links)
Typescript. Includes bibliographical references (p. 55-60).
|
235 |
A graphic user interface for rapid integration of steganography software /Wootten, David Raiman. January 1996 (has links) (PDF)
Thesis (Master of Computer Science) Naval Postgraduate School, March 1996. / "March 1996." Thesis advisor(s): Cynthia E. Irvine, Michael J. Zyda. BIbliography: p. 125-127. Also available online.
|
236 |
An elliptic curve cryptography based key agreement protocol for wireless network security /Sethi, Vibha, January 2006 (has links)
Thesis (M.S.) -- University of Texas at Dallas, 2006 / Includes vita. Includes bibliographical references (leaves [62-65]-)
|
237 |
Design and evaluation of an "FPGA based" hardware accelerator for elliptic curve cryptography point multiplication a thesis presented to the faculty of the Graduate School, Tennessee Technological University /Gwalani, Kapil A., January 2009 (has links)
Thesis (M.S.)--Tennessee Technological University, 2009. / Title from title page screen (viewed on June 25, 2010). Bibliography: leaves 93-96.
|
238 |
Security models for authorization, delegation and accountabilityLui, W. C. January 2005 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
|
239 |
Correlation attacks on stream ciphers using convolutional codesBruwer, Christian S. January 2004 (has links)
Thesis (M.Eng.)(Electronic)--University of Pretoria, 2005. / Title from opening screen (viewed March 22, 2006). Includes summaries in English and Afrikaans. Includes bibliographical references.
|
240 |
Enhancements of the non-linear knapsack cryptosystem : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Science at the University of Canterbury /Tu, Zhiqi. January 2006 (has links)
Thesis (M. Sc.)--University of Canterbury, 2006. / Typescript (photocopy). Includes bibliographical references (p. [93]-98). Also available via the World Wide Web.
|
Page generated in 0.0478 seconds