Dissertations / Theses on the topic 'Computational cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computational cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Rupp, Andy. "Computational aspects of cryptography and cryptanalysis." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2008. http://d-nb.info/996840451/04.
Full textHerzog, Jonathan 1975. "Computational soundness for standard assumptions of formal cryptography." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28713.
Full textKawachi, Akinori. "Studies on quantum query complexity and quantum computational cryptography." 京都大学 (Kyoto University), 2004. http://hdl.handle.net/2433/145315.
Full textWilcox, Nicholas. "A Computational Introduction to Elliptic and Hyperelliptic Curve Cryptography." Oberlin College Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1528649455201473.
Full textHorvitz, David Omer. "Expressiveness of definitions and efficiency of constructions in computational cryptography." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/7359.
Full textVyas, Nilesh. "Quantum cryptography in a hybrid security model." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT049.
Full textMantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Full textZhu, Hong 1975. "Survey of computational assumptions used in cryptography broken or not by Shor's algorithm." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33866.
Full textPehlivanoglu, Serdar. "Rijndael Circuit Level Cryptanalysis." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-050505-121816/.
Full textMaislin, Scott. "Cyclic Codes and Cyclic Lattices." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1552.
Full textKünnemann, Robert. "Foundations for analyzing security APIs in the symbolic and computational model." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2014. http://tel.archives-ouvertes.fr/tel-00942459.
Full textCouteau, Geoffroy. "Zero-knowledge proofs for secure computation." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE065/document.
Full textRai, Tapan S. "Infinite Groebner Bases And Noncommutative Polly Cracker Cryptosystems." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26504.
Full textChailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security." Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.
Full textAlborch, escobar Ferran. "Private Data Analysis over Encrypted Databases : Mixing Functional Encryption with Computational Differential Privacy." Electronic Thesis or Diss., Institut polytechnique de Paris, 2025. http://www.theses.fr/2025IPPAT003.
Full textTudor, Crina. "Studies of Cipher Keys from the 16th Century : Transcription, Systematisation and Analysis." Thesis, Uppsala universitet, Institutionen för lingvistik och filologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-396922.
Full textPasselègue, Alain. "Algebraic frameworks for pseudorandom functions." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE059.
Full textWoodruff, David Paul 1980. "Cryptography in an unbounded computation model." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87301.
Full textDuclos, Mathilde. "Méthodes pour la vérification des protocoles cryptographiques dans le modèle calculatoire." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM002/document.
Full textRangasamy, Jothi Ramalingam. "Cryptographic techniques for managing computational effort." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61007/1/Jothi_Rangasamy_Thesis.pdf.
Full textBailey, Daniel V. "Computation in optimal extension fields." Link to electronic version, 2000. http://www.wpi.edu/Pubs/ETD/Available/etd-0428100-133037/.
Full textHugounenq, Cyril. "Volcans et calcul d'isogénies." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLV050/document.
Full textKiyoshima, Susumu. "A Study on Cryptographic Protocols: Achieving Strong Security for Zero-knowledge Proofs and Secure Computation." Kyoto University, 2018. http://hdl.handle.net/2433/232156.
Full textLe, Gluher Aude. "Symbolic Computation and Complexity Analyses for Number Theory and Cryptography." Electronic Thesis or Diss., Université de Lorraine, 2021. http://www.theses.fr/2021LORR0245.
Full textNgo, Long. "Computationally sound automated proofs of cryptographic schemes." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/54668/1/Long_Ngo__Thesis.pdf.
Full textTakashima, Katsuyuki. "Computational Aspects of Jacobian Varieties and Their Cryptographic Applications." 京都大学 (Kyoto University), 2009. http://hdl.handle.net/2433/123843.
Full textUrban, Antoine. "Efficient delegated secure multiparty computation." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT050.
Full textMantha, Anusha. "Improving Reliability in DNA based Computations with Applications to Cryptography." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352992351.
Full textRaghav, Himadri Singh. "Adiabatic circuits for power-constrained cryptographic computations." Thesis, University of Westminster, 2018. https://westminsterresearch.westminster.ac.uk/item/q948q/adiabatic-circuits-for-power-constrained-cryptographic-computations.
Full textVialla, Bastien. "Contributions à l'algèbre linéaire exacte sur corps finis et au chiffrement homomorphe." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS112.
Full textMeyer, Pierre. "Sublinear-communication secure multiparty computation." Electronic Thesis or Diss., Université Paris Cité, 2023. http://www.theses.fr/2023UNIP7129.
Full textWarinschi, Bogdan. "On the computational soundness of formal analysis of cryptographic protocols /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3120455.
Full textWu, Huapeng. "Efficient computations in finite fields with cryptographic significance." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0027/NQ38293.pdf.
Full textTaber, Michael S. "Distributed pre-computation for a cryptanalytic time-memory trade-off /." Online version of thesis, 2008. http://hdl.handle.net/1850/7805.
Full textThillard, Adrian. "Contre-mesures aux attaques par canaux cachés et calcul multi-parti sécurisé." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE053/document.
Full textLabrande, Hugo. "Explicit computation of the Abel-Jacobi map and its inverse." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0142/document.
Full textFokin, Dennis. "A secure multi-party scheme with certificateless cryptography for secret key extraction." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231574.
Full textMakriyannis, Nikolaos. "Fairness in two-party computation : characterizing fair functions." Doctoral thesis, Universitat Pompeu Fabra, 2016. http://hdl.handle.net/10803/395171.
Full textHişil, Hüseyin. "Elliptic curves, group law, and efficient computation." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/33233/1/H%C3%BCseyin_Hi%C5%9Fil_Thesis.pdf.
Full textRiahinia, Mahshid. "Constrained Pseudorandom Functions : New Constructions and Connections with Secure Computation." Electronic Thesis or Diss., Lyon, École normale supérieure, 2024. http://www.theses.fr/2024ENSL0022.
Full textMusic, Luka. "Multi-Party Quantum Cryptography : from Folklore to Real-World." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS412.
Full textChoo, Kim-Kwang Raymond. "Key establishment : proofs and refutations." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16262/.
Full textLabrande, Hugo. "Explicit computation of the Abel-Jacobi map and its inverse." Electronic Thesis or Diss., Université de Lorraine, 2016. http://www.theses.fr/2016LORR0142.
Full textCarter, Henry Lee. "Efficient techniques for secure multiparty computation on mobile devices." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54318.
Full textOLIVEIRA, FILHO Márcio Barbosa de. "Utilizando o protocolo Bitcoin para condução de computações multilaterais seguras e justas." Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/17143.
Full textBarbier, Morgan. "Décodage en liste et application à la sécurité de l'information." Phd thesis, Palaiseau, Ecole polytechnique, 2011. https://theses.hal.science/docs/00/67/74/13/PDF/these.pdf.
Full textAlperin-Sheriff, Jacob. "Towards practical fully homomorphic encryption." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53951.
Full textBarbier, Morgan. "Décodage en liste et application à la sécurité de l'information." Phd thesis, Ecole Polytechnique X, 2011. http://pastel.archives-ouvertes.fr/pastel-00677421.
Full textChoo, Kim-Kwang Raymond. "Key establishment : proofs and refutations." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16262/1/Kim-Kwang_Choo_Thesis.pdf.
Full textLamoureux, Louis-Philippe. "Theoretical and experimental aspects of quantum cryptographic protocols." Doctoral thesis, Universite Libre de Bruxelles, 2006. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210776.
Full text