31 |
Computational algebraic attacks on the Advanced Encryption Standard (AES)Mantzouris, Panteleimon. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering and M.S.in Applied Mathematics)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
|
32 |
Rijndael Circuit Level CryptanalysisPehlivanoglu, Serdar. January 2005 (has links)
Thesis (M.S.) -- Worcester Polytechnic Institute. / Keywords: private-key cryptography; Advanced Encryption Standard; K-secure; hermetic; block cipher; circuit complexity. Includes bibliographical references (p. 75-79).
|
33 |
Genetic algorithms in cryptography /Delman, Bethany. January 2003 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2004. / Typescript. Includes bibliographical references (leaves 85-87).
|
34 |
Establishing trust in encrypted programsXia, Ying Han. January 2008 (has links)
Thesis (Ph.D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Owen, Henry; Committee Co-Chair: Abler, Randal; Committee Member: Copeland, John; Committee Member: Giffin, Jon; Committee Member: Hamblen, Jim.
|
35 |
Smart card enabled security services to support secure telemedicine applicationsMutsuddi, Monoreet. January 2000 (has links)
Thesis (M.S.)--West Virginia University, 2000. / Title from document title page. Document formatted into pages; contains vi, 70 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 70-71).
|
36 |
On the suitability of power functions as S-boxes for symmetric cryptosystemsJedlicka, David Charles, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
|
37 |
An analysis of a sparse linearization attack on the advanced encryption standardRednour, Stephanie D. January 1900 (has links) (PDF)
Thesis (M. S.)--University of North Carolina at Greensboro, 2006. / Title from PDF title page screen. Advisor: Shanmugathasan Suthaharan ; submitted to the Dept. of Mathematical Sciences. Includes bibliographical references (p. 33-34)
|
38 |
Correlation attacks on stream ciphers using convolutional codesBruwer, Christian S. January 2004 (has links)
Thesis (M.Eng.)(Electronic)--University of Pretoria, 2005. / Title from opening screen (viewed March 22, 2006). Includes summaries in English and Afrikaans. Includes bibliographical references.
|
39 |
A communication-computation efficient group key algorithm for large and dynamic groups /Zheng, Shanyu. January 1900 (has links)
Thesis (Ph.D.)--University of Idaho, 2006. / Major professor: Jim Alves-Foss. Abstract. Includes bibliographical references (leaves 82-86). Also available online in PDF format.
|
40 |
An implementation of the El Gamal elliptic curve cryptosystem over a finite field of characteristic PArslanian, Samuel Thomas January 1998 (has links) (PDF)
No description available.
|
Page generated in 0.1434 seconds