• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 462
  • 55
  • 44
  • 37
  • 25
  • 24
  • 14
  • 7
  • 5
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • Tagged with
  • 811
  • 409
  • 351
  • 321
  • 294
  • 232
  • 93
  • 91
  • 91
  • 85
  • 83
  • 78
  • 76
  • 73
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

A Circuit Generator for Logic Reduction of Boolean Functions and Its Application to the Design of Advanced Encryption Standard

Lin, Chi-Cheng 25 July 2005 (has links)
The constant matrix multiplication is one of the key operations in many applications including digital signal processing, communication, and coding. In general, constant matrix multiplication can be expressed as bit-level Boolean functions. Then, common subexpression elimination (CSE) can be used to reduce the area cost of realizing these bit-level functions by finding the shared common factors among these bit-level equations. The proposed circuit generator performs logic reduction on the input Boolean functions and produces the simplified Verilog HDL codes as output. Then the simplified code is fed into Synopsys Design Compiler for further logic minimization and technology mapping to generate gate-level netlists. In this thesis, we present ten different CSE algorithms for logic reduction of the bit-level Boolean functions. The comparisons include both the architecture-level technology-independent results and the Synopsys synthesized technology-dependent results. According to the experiments, we observe that our CSE can effectively reduce the area cost. We also apply the CSE to the design of the Advanced Encryption Standard (AES) in cryptography.
62

Analysis of the PPTP and IPSec protocols in Virtual Private Networks

Tryggvason, Thorir January 2000 (has links)
<p>Today increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.</p><p>The results show that it is quite complicated to setup a VPN network and to get operational. The results also show that there are security compromises within the VPN structure that indicate that if proper precaution is not taken it may give a false sense of security, where the user believes that it is a secure communication when in reality it is not.</p>
63

Distributed password cracking

Crumpacker, John R. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Dinolt, George. Second Reader: Eagle, Chris. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Distributed password cracking, Berkeley Open Infrastructure for Network Computing (BOINC), and John the Ripper. Includes bibliographical references (p. 63-64). Also available in print.
64

Information hiding

Le, Tri Van. Desmedt, Yvo. January 2004 (has links)
Thesis (Ph. D.)--Florida State University, 2004. / Advisor: Dr. Yvo Desmedt, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (June 18, 2004). Includes bibliographical references.
65

Multidimensional data encryption with virtual optics /

Yu, Lingfeng. January 2003 (has links)
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references. Also available in electronic version. Access restricted to campus users.
66

The feasibility of memory encryption and authentication

Owen, Donald Edward, Jr. 09 October 2013 (has links)
This thesis presents an analysis of the implementation feasibility of RAM authentication and encryption. Past research as used simulations to establish that it is possible to authenticate and encrypt the contents of RAM with reasonable performance penalties by using clever implementations of tree data structures over the contents of RAM. However, previous work has largely bypassed implementation issues such as power consumption and silicon area required to implement the proposed schemes, leaving implementation details unspecified. This thesis studies the implementation cost of AES-GCM hardware and software solutions for memory authentication and encryption and shows that software solutions are infeasible because they are too costly in terms of performance and power, whereas hardware solutions are more feasible. / text
67

On the suitability of power functions as S-boxes for symmetric cryptosystems

Jedlicka, David Charles, 1978- 12 August 2011 (has links)
Not available / text
68

Δημιουργία εφαρμογής για την κρυπτογράφηση και αποκρυπτογράφηση γραπτού κειμένου

Κακαβάς, Γεράσιμος 05 May 2009 (has links)
Ο βασικός στόχος της παρούσας διπλωματικής εργασίας είναι η δημιουργία μίας βιβλιοθήκης συναρτήσεων κρυπτογράφησης γραπτού κειμένου, η οποία να μπορεί στην συνέχεια να επεξεργαστεί και να αναπτυχθεί περεταίρω με την προσθήκη νέων συναρτήσεων ή ακόμη και με την βελτίωση των ήδη υπαρχόντων. Στα πλαίσια της υλοποιήθηκαν τέσσερεις συναρτήσεις κρυπτογράφησης-αποκρυπτογράφησης οι οποίες παρουσιάζονται αναλυτικά στο κείμενο της εργασίας. Οι συναρτήσεις αυτές συγκρίνονται ως προς την ταχύτητά τους με τον αλγόριθμο κρυπτογράφησης DES (Data Encryption Standard) από όπου προκύπτει ότι μία εξ αυτών επιτυγχάνει μικρότερους χρόνους κρυπτογράφησης-αποκρυπτογράφησης, ενώ οι χρόνοι των υπολοίπων τριών είναι ελαφρώς υψηλότεροι. Τέλος πραγματοποιείται μία εκτίμηση ως προς την ασφάλεια που παρέχεται από την χρήση των συγκεκριμένων συναρτήσεων. / The main goal of this diploma dissertation is to create a library of cryptographic functions applied in text, which can then be able to be processed and further more expand by adding new functions or even by improving the existing ones. Within the framework of this dissertation four encryption-decryption functions were created, which are widely presented in this text. The speed of these functions is compared to the algorithm DES (Data Encryption Standard) from which results that one of them achieves faster times of encryption-decryption while the other are taking slightly longer to complete. Finally, an estimation is carried out as far as the safety provided by the use of these specific functions.
69

Transformations for linguistic steganography

Chang, Ching-Yun January 2013 (has links)
No description available.
70

CRT Based Somewhat Homomorphic Encryption Over the Integers

Alzahrani, Ali Saeed 24 April 2015 (has links)
Over the last decade, the demand for privacy and data confidentiality in communication and storage processes have increased exponentially. Cryptography can be the solution for this demand. However, the critical issue occurs when there is a need for computing publicly on sensitive information or delegating computation to untrusted machines. This must be done in such a way that preserves the information privacy and accessibility. For this reason, we need an encryption algorithm that allows computation on information without revealing details about them. In 1978 Rivest, Adleman and Dertouzos raised a crucial question: can we use a special privacy homomorphism to encrypt the data and do an unlimited computations on it while it remains encrypted without the necessity of decrypting it? Researchers made extensive efforts to achieve such encryption algorithm. In this paper, we introduce the implementation of the CRT-based somewhat homomorphic encryption over the integers scheme. The main goal is to provide a proof of concept of this new and promising encryption algorithm. / Graduate

Page generated in 0.0875 seconds