Dissertations / Theses on the topic 'Cryptography and Information Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cryptography and Information Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Han, Yong-Fei. "Fast algorithms for public key cryptography." Thesis, Royal Holloway, University of London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244544.
Full textKANADE, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-01057728.
Full textKanade, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography." Thesis, Evry, Institut national des télécommunications, 2010. http://www.theses.fr/2010TELE0022/document.
Full textLopez, Samuel. "MODERN CRYPTOGRAPHY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/729.
Full textVyas, Nilesh. "Quantum cryptography in a hybrid security model." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT049.
Full textCanale, Matteo. "Classical processing algorithms for Quantum Information Security." Doctoral thesis, Università degli studi di Padova, 2014. http://hdl.handle.net/11577/3423585.
Full textRogers, Jason Lee. "Secure distribution of open source information." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FRogers.pdf.
Full textHarrison, Willie K. "Physical-layer security: practical aspects of channel coding and cryptography." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44818.
Full textPeters, Timothy M. "DEFY: A Deniable File System for Flash Memory." DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1230.
Full textBesson, Loïc. "Design, analysis and implementation of cryptographic symmetric encryption algorithms on FPGA." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG104.
Full textGalassi, De Orchi Tommaso. "A Security Study for Non-Internet Connected Managed Software." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99047.
Full textWerstén, Bengt. "Implementing the Transport Layer Security Protocol for Embedded Systems." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8767.
Full textTomida, Junichi. "Towards Practical Inner Product Functional Encryption." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/264641.
Full textPan, Jiaxin [Verfasser], Eike [Gutachter] Kiltz, and Tibor [Gutachter] Jager. "Improved security proofs and constructions for public-key cryptography / Jiaxin Pan ; Gutachter: Eike Kiltz, Tibor Jager." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1114497045/34.
Full textGudlaugsson, Rúnar. "Using security protocols to extend the FiLDB architecture." Thesis, University of Skövde, Department of Computer Science, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-640.
Full textChawan, Akshay. "Security Enhancement of Over-The-Air Update for Connected Vehicles." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1533246722910754.
Full textGutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.
Full textMa, Yao. "Quantum Hardware Security and Near-term Applications." Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS500.pdf.
Full textKelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.
Full textVan, Assche Gilles. "Information-Theoretic aspects of quantum key distribution." Doctoral thesis, Universite Libre de Bruxelles, 2005. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211050.
Full textPartala, J. (Juha). "Algebraic methods for cryptographic key exhange." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526207445.
Full textWunderer, Thomas [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Martin [Akademischer Betreuer] Albrecht. "On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks / Thomas Wunderer ; Johannes Buchmann, Martin Albrecht." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/116879868X/34.
Full textRai, Tapan S. "Infinite Groebner Bases And Noncommutative Polly Cracker Cryptosystems." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26504.
Full textBauer, David Allen. "Preserving privacy with user-controlled sharing of verified information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31676.
Full textFischmann, Matthias. "Data confidentiality and reputation schemes in distributed information systems." Doctoral thesis, Humboldt-Universität zu Berlin, Wirtschaftswissenschaftliche Fakultät, 2008. http://dx.doi.org/10.18452/15811.
Full textKubík, Pavel. "Kryptovirologie." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235983.
Full textGiacon, Federico [Verfasser], Eike [Gutachter] Kiltz, and Nils [Gutachter] Fleischhacker. "Strengthening public-key cryptography : robust constructions and multi-user security / Federico Giacon ; Gutachter: Eike Kiltz, Nils Fleischhacker ; Fakultät für Mathematik." Bochum : Ruhr-Universität Bochum, 2019. http://d-nb.info/1195221320/34.
Full textBeauxis, Romain. "Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols." Phd thesis, Ecole Polytechnique X, 2009. http://tel.archives-ouvertes.fr/tel-00772693.
Full textFadil, Yousra Ahmed. "Security analysis of steganalyzers." Thesis, Bourgogne Franche-Comté, 2017. http://www.theses.fr/2017UBFCD015/document.
Full textMOLTENI, MARIA CHIARA. "ON THE SECURITY OF CRYPTOGRAPHIC CIRCUITS:PROTECTION AGAINST PROBING ATTACKS AND PERFORMANCE IMPROVEMENT OF GARBLED CIRCUITS." Doctoral thesis, Università degli Studi di Milano, 2022. http://hdl.handle.net/2434/920426.
Full textBarbier, Morgan. "Décodage en liste et application à la sécurité de l'information." Phd thesis, Ecole Polytechnique X, 2011. http://pastel.archives-ouvertes.fr/pastel-00677421.
Full textJayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.
Full textPérez, Kempner Octavio. "Malleable cryptography : advances and applications to privacy-enhancing technologies." Electronic Thesis or Diss., Université Paris sciences et lettres, 2022. http://www.theses.fr/2022UPSLE056.
Full textBarbier, Morgan. "Décodage en liste et application à la sécurité de l'information." Phd thesis, Palaiseau, Ecole polytechnique, 2011. https://theses.hal.science/docs/00/67/74/13/PDF/these.pdf.
Full textDyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.
Full textHaraldsson, Emil. "Strong user authentication mechanisms." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2688.
Full textHorndahl, Charles, and Kristian Maric. "WLAN : Oskyddad och okontrollerad datakommunikation." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-236.
Full textLiu, Yi. "Security Assessment Against Side-Channel Attacks : Insights from an Information-Theoretic Perspective." Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAT033.
Full textYachouh, Marwan. "Re-authentication of Critical Operations." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1174.
Full textCoetzee, Dirk Badenhorst. "The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80292.
Full textPuteaux, Pauline. "Analyse et traitement des images dans le domaine chiffré." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS119.
Full textMacdonell, James Patrick. "MiniCA: A web-based certificate authority." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3256.
Full textHalunen, K. (Kimmo). "Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions." Doctoral thesis, Oulun yliopisto, 2012. http://urn.fi/urn:isbn:9789514299667.
Full textDevulapalli, Venkata Lakshmi Narasimha. "Application of Huffman Data Compression Algorithm in Hashing Computation." TopSCHOLAR®, 2018. https://digitalcommons.wku.edu/theses/2614.
Full textКоротка, Г. М. "Система захисту розумного будинку на основі блокчейн технологій". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24852.
Full textChailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security." Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.
Full textOliveira, Matheus Fernandes de. "Um estudo sobre a implementação de criptossistemas baseados em emparelhamentos bilineares sobre curvas elípticas em cartões inteligentes de oito bits." [s.n.], 2010. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259574.
Full textGajland, Phillip. "On Statistical Properties of Arbiter Physical Unclonable Functions." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230672.
Full textBoström, Erik. "Refined Access Control in a Distributed Environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1020.
Full textDo, Thanh-Toan. "Security analysis of image copy detection systems based on SIFT descriptors." Phd thesis, Université Rennes 1, 2012. http://tel.archives-ouvertes.fr/tel-00766932.
Full text