1 |
Zero knowledge proofs and secret sharing problems /Woll, Suzanne Heather, January 1988 (has links)
Thesis (Ph. D.)--University of Washington, 1988. / Vita. Includes bibliographical references (leaves [106]-113).
|
2 |
Tamper-resistant arithmetic for public-key cryptographyGaubatz, Gunnar. January 2007 (has links)
Dissertation (Ph.D.)--Worcester Polytechnic Institute. / Keywords: Side Channel Attacks; Fault Attacks; Public-Key Cryptography; Error Detection; Error Detecting Codes. Includes bibliographical references (leaves 127-136).
|
3 |
Improved Cryptographic Processor Designs for Security in RFID and Other Ubiquitous SystemsLeinweber, Lawrence January 2009 (has links)
Thesis (Ph.D.)--Case Western Reserve University, 2009 / Department of Computer Engineering Abstract Title from PDF (viewed on 20 April 2009) Available online via the OhioLINK ETD Center
|
4 |
A distributed multiprecision cryptographic library design/Hışıl, Hüseyin. Koltuksuz, Ahmet January 2005 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2005. / Keywords: Multiprecision number. Includes bibliographical references (leaves. 61-63).
|
5 |
Probability distributions over cryptographic protocolsSkaff, Stephanie J. C. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2009. / Thesis Advisor(s): Herzog, Jonathan. "June 2009." Description based on title screen as viewed on 14 July 2009. Author(s) subject terms: Automatic protocol generation; protocol analysis; security protocols; cryptographic protocols; key-exchange protocols; authentication protocols; protocol verification. Includes bibliographical references (p. 131-134). Also available in print.
|
6 |
An analysis of bent function properties using the transeunt triangle and the SRC-6 reconfigurable computerShafer, Jennifer L. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Butler,Jon T. ; Stanica, Pantelimon. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Bent Functions, Cryptography, Field Programmable Gate Array (FPGA), Reconfigurable Computer, Transeunt Triangle. Includes bibliographical references (p. 119-120). Also available in print.
|
7 |
Cube-type algebraic attacks on wireless encryption protocolsPetrakos, Nikolaos. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science and M.S. in Applied Mathematics)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Dinolt, George ; Michael, James Bret ; Stanica, Pantelimon. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Wireless Security, Cryptanalysis, Boolean Functions, Algebraic Attacks, Correlation Attacks, Cube Attacks, Bluetooth, Security Protocols. Includes bibliographical references (p. 77-80). Also available in print.
|
8 |
Characteristics of the binary decision diagrams of Boolean Bent FunctionsSchafer, Neil Brendan. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Butler, Jon T. ; Stanica, Pantelimon. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Binary Decision Diagrams, Boolean Bent Functions, Homogeneous Functions, Disjoint Quadratic Functions, Symmetric Bent Functions, P-Equivalence, Minimization, Hardware Complexity, Circuit Complexity, Graphical Interface, Nonlinearity, Hamming Distance, Cryptography. Includes bibliographical references (p. 151-152). Also available in print.
|
9 |
Finding bent functions using genetic algorithmsSchneider, Stuart W. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Butler, Jon T. ; Stanica, Pantelimon. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Genetic Algorithm, Bent Functions, Reconfigurable Computer, Field Programmable Gate Array (FPGA), Cryptology. Includes bibliographical references (p. 177-178). Also available in print.
|
10 |
Analysis of a man-in-the-middle attack on the Diffie-Hellman key exchange protocolGeary, Aaron C. January 2009 (has links) (PDF)
Thesis (M.S. in Applied Mathematics and M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Stanica, Pantelimon ; Kanevsky, Valery. "September 2009." Description based on title screen as viewed on November 6, 2009 Author(s) subject terms: Cryptography, Diffie-Hellman, Man-in-the-Middle Attack. Includes bibliographical references (p. 55-56). Also available in print.
|
Page generated in 0.0466 seconds