• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 77
  • 22
  • 9
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 138
  • 127
  • 48
  • 36
  • 25
  • 22
  • 21
  • 20
  • 20
  • 19
  • 18
  • 18
  • 17
  • 16
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems

Ebeid, Nevine Maurice 04 1900 (has links)
It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to decorrelate the data processed by the device from secret key parts resulting in the value of this data. Among the countermeasures that appeared in the literature were those that resulted in a random representation of the key known as the binary signed digit representation (BSD). We have discovered some interesting properties related to the number of possible BSD representations for an integer and we have proposed a different randomization algorithm. We have also carried our study to the $\tau$-adic representation of integers which is employed in elliptic curve cryptosystems (ECCs) using Koblitz curves. We have then dealt with another randomization countermeasure which is based on randomly splitting the key. We have investigated the secure employment of this countermeasure in the context of ECCs.
62

Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems

Ebeid, Nevine Maurice 04 1900 (has links)
It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to decorrelate the data processed by the device from secret key parts resulting in the value of this data. Among the countermeasures that appeared in the literature were those that resulted in a random representation of the key known as the binary signed digit representation (BSD). We have discovered some interesting properties related to the number of possible BSD representations for an integer and we have proposed a different randomization algorithm. We have also carried our study to the $\tau$-adic representation of integers which is employed in elliptic curve cryptosystems (ECCs) using Koblitz curves. We have then dealt with another randomization countermeasure which is based on randomly splitting the key. We have investigated the secure employment of this countermeasure in the context of ECCs.
63

Lie methods in pro-p groups

Snopçe, Ilir. January 2009 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Department of Mathematical Sciences, 2009. / Includes bibliographical references.
64

Πραγματικά σώματα. P - αδικοί αριθμοί. Διατιμήσεις

Νυδριώτου, Μαριγούλα 11 September 2008 (has links)
- / -
65

Primary Decomposition and Secondary Representation of Modules over a Commutative Ring

Baig, Muslim 21 April 2009 (has links)
This paper presents the theory of Secondary Representation of modules over a commutative ring and their Attached Primes; introduced in 1973 by I. MacDonald as a dual to the important theory of associated primes and primary decomposition in commutative algebra. The paper explores many of the basic aspects of the theory of primary decomposition and associated primes of modules in the hopes to delineate and motivate the construction of a secondary representation, when possible. The thesis discusses the results of the uniqueness of representable modules and their attached primes, and, in particular, the existence of a secondary representation for Artinian modules. It concludes with some interesting examples of both secondary and representable modules, highlighting the consequences of the results thus established.
66

The Role of Autotaxin in the Regulation of Lysophosphatidylcholine-Induced Cell Migration

Gaetano, Cristoforo Giuseppe Unknown Date
No description available.
67

Finding Zeros of Rational Quadratic Forms

Shaughnessy, John F 01 January 2014 (has links)
In this thesis, we introduce the notion of quadratic forms and provide motivation for their study. We begin by discussing Diophantine equations, the field of p-adic numbers, and the Hasse-Minkowski Theorem that allows us to use p-adic analysis determine whether a quadratic form has a rational root. We then discuss search bounds and state Cassels' Theorem for small-height zeros of rational quadratic forms. We end with a proof of Cassels' Theorem and suggestions for further reading.
68

FUNCTIONAL EQUATIONS FOR DOUBLE L-FUNCTIONS AND VALUES AT NON-POSITIVE INTEGERS

TSUMURA, HIROFUMI, MATSUMOTO, KOHJI, KOMORI, YASUSHI 09 1900 (has links)
No description available.
69

On the construction of groups with prescribed properties

Decker, Erin. January 2008 (has links)
Thesis (M.A.)--State University of New York at Binghamton, Department of Mathematical Sciences, 2009. / Includes bibliographical references.
70

Invariant representations of GSp(2)

Chan, Ping-Shun, January 2005 (has links)
Thesis (Ph. D.)--Ohio State University, 2005. / Title from first page of PDF file. Includes bibliographical references (p. 253-255).

Page generated in 0.0306 seconds