Spelling suggestions: "subject:"data encryption - computer science"" "subject:"data encryption - coomputer science""
61 |
Preserving trust across multiple sessions in open systems /Chan, Fuk Wing Thomas, January 2004 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2004. / Includes bibliographical references (p. 47-48).
|
62 |
High-performance advanced encryption standard (AES) security co-processor designTandon, Prateek, January 2003 (has links) (PDF)
Thesis (Ph. D.)--School of Electrical and Computer Engineering, Georgia Institute of Technology, 2004. Directed by Hsien-Hsin S. Lee. / Includes bibliographical references (leaves 55-58).
|
63 |
Visual cryptography for color images : formal security analysis and new construction /Leung, Wing Pan. January 2009 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2009. / "Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy." Includes bibliographical references (leaves 103-108)
|
64 |
Hardware implementation of message authentication algorithms for Internet security /Deepakumara, Janaka T., January 2002 (has links)
Thesis (M.Eng.)--Memorial University of Newfoundland, 2002. / Bibliography: leaves 143-152.
|
65 |
Image watermarking and data hiding techniques /Wong, Hon Wah. January 2003 (has links)
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
|
66 |
Data hiding watermarking for halftone images /Fu, Ming Sun. January 2003 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2003. / Vita. Includes bibliographical references. Also available in electronic version. Access restricted to campus users.
|
67 |
Protecting sensitive credential content during trust negotiation /Jarvis, Ryan D., January 2003 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2003. / Includes bibliographical references (p. 51-54).
|
68 |
High speed and actively stabilised quantum key distributionDixon, Alexander Robert January 2011 (has links)
No description available.
|
69 |
Design of a novel hybrid cryptographic processorLi, Jianzhou, University of Lethbridge. Faculty of Arts and Science January 2005 (has links)
A new multiplier that supports fields GF(p) and GF (2n) for the public-key cryptography, and fields GF (28) for the secret-key cryptography is proposed in this thesis. Based on the core multiplier and other extracted common operations, a novel hybrid crypto-processor is built which processes both public-key and secret-key cryptosystems. The corresponding instruction set is also presented. Three cryptographic algorithms: the Elliptic Curve Cryptography (ECC), AES and RC5 are focused to run in the processor. To compute scalar multiplication kP efficiently, a blend of efficient algorthms on elliptic curves and coordinates selections and of hardware architecture that supports arithmetic operations on finite fields is requried. The Nonadjacent Form (NAF) of k is used in Jacobian projective coordinates over GF(p); Montgomery scalar multiplication is utilized in projective coordinates over GF(2n). The dual-field multiplier is used to support multiplications over GF(p) and GF(2n) according to multiple-precision Montgomery multiplications algorithms. The design ideas of AES and RC5 are also described. The proposed hybrid crypto-processor increases the flexibility of security schemes and reduces the total cost of cryptosystems. / viii, 87 leaves : ill. (some col.) ; 28 cm.
|
70 |
A reconfigurable and scalable efficient architecture for AESLi, Ke, University of Lethbridge. Faculty of Arts and Science January 2008 (has links)
A new 32-bit reconfigurable FPGA implementation of AES algorithm is presented in this
thesis. It employs a single round architecture to minimize the hardware cost. The combinational
logic implementation of S-Box ensures the suitability for non-Block RAMs
(BRAMs) FPGA devices. Fully composite field GF((24)2) based encryption and keyschedule
lead to the lower hardware complexity and convenience for the efficient subpipelining.
For the first time, a subpipelined on-the-fly keyschedule over composite field GF((24)2)
is applied for the all standard key sizes (128-, 192-, 256-bit). The proposed architecture
achieves a throughput of 805.82Mbits/s using 523 slices with a ratio throughput/slice of
1.54Mbps/Slice on Xilinx Virtex2 XC2V2000 ff896 device. / ix, 77 leaves : ill. ; 29 cm.
|
Page generated in 0.1578 seconds