Dissertations / Theses on the topic 'Cryptosystem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cryptosystem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Huynh, Evan. "Rabin's Cryptosystem." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105964.
Full textMersin, Ali Koltuksuz Ahmet. "The Comparative Performance Analysis of Lattice Based Ntru Cryptosystem With Other Asymmetrical Cryptosystems/." [s.l.]: [s.n.], 2007. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000609.pdf.
Full textNemec, Matus <1992>. "Challenging RSA cryptosystem implementations." Doctoral thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/17849.
Full textHettinger, Christopher James. "A New Public-Key Cryptosystem." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5492.
Full textCimen, Canan. "On The Ntru Public Key Cryptosystem." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12609848/index.pdf.
Full textІлясова, О. Є. "Аналіз алгоритмів побудови параметрів для криптосистем на еліптичних кривих". Thesis, Видавництво СумДУ, 2006. http://essuir.sumdu.edu.ua/handle/123456789/22416.
Full textWilliams, Deidre D. "Key management for McEliece public-key cryptosystem." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/14864.
Full textChoi, Su-Jeong. "Cryptanalysis of a homomorphic public-key cryptosystem." Thesis, Royal Holloway, University of London, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.434343.
Full textTu, Zhiqi. "Enhancements of the Non-linear Knapsack Cryptosystem." Thesis, University of Canterbury. Computer Science and Software Engineering, 2006. http://hdl.handle.net/10092/1080.
Full textClevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.
Full textAysu, Aydin. "Resource-constrained and Resource-efficient Modern Cryptosystem Design." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/78469.
Full textBansal, Tarun Kumar. "Designing generic asymmetric key cryptosystem with message paddings." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/117071/1/Tarun%20Kumar_Bansal_Thesis.pdf.
Full textАвраменко, Віктор Васильович, Михайло Ігорович Заболотний, Виктор Васильевич Авраменко та Viktor Vasylovych Avramenko. "Аналіз стійкості криптосистеми на множині функцій дійсних змінних". Thesis, Видавництво СумДУ, 2010. http://essuir.sumdu.edu.ua/handle/123456789/4393.
Full textHo, Sun Wah. "A cryptosystem based on chaotic and elliptic curve cryptography /." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-it-b19886238a.pdf.
Full textYesil, Soner. "A High-speed Asic Implementation Of The Rsa Cryptosystem." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/3/1124783/index.pdf.
Full textHarayama, Tomohiro. "A method of Weil sum in multivariate quadratic cryptosystem." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5938.
Full textDighe, Ashish Arun. "Implementation of RSA Cryptosystem for Next Generation RFID Tags." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/19856.
Full textEl, Rifai Ahmed Mahmoud. "Applications of linear block codes to the McEliece cryptosystem." Diss., Georgia Institute of Technology, 1995. http://hdl.handle.net/1853/16604.
Full textHenderson, Roger William. "Cryptanalysis of braid group cryptosystem and related combinatorial structures." Thesis, Royal Holloway, University of London, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.440519.
Full textCourtois, Jérôme. "Leak study of cryptosystem implementations in randomized RNS arithmetic." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS290.
Full textAl-Tuwaijry, Fahd A. A. "Fast algorithms for implementation of public-key cryptosystems : VLSI simulation of modified algorithm to increase the speed of public-key cryptosystem (RSA) implementation." Thesis, University of Bradford, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.282982.
Full textLe, Van-Ly. "Polly two - a public key cryptosystem based on Polly cracker." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967582806.
Full textSingh, Namita. "Secure communication using elliptic curve cryptosystem in ad hoc network." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27730.
Full textWilhelm, Kyle. "Aspects of hardware methodologies for the NTRU public-key cryptosystem /." Online version of thesis, 2008. http://hdl.handle.net/1850/7774.
Full textPoyen, Liu, and 劉伯彥. "Randomly Dynamic Cryptosystem." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/80256089054044271271.
Full textBhateja, Ashok Kumar. "Biometrics based cryptosystem." Thesis, 2017. http://localhost:8080/xmlui/handle/12345678/7436.
Full textTetikoglu, Ipek. "The Elgamal Cryptosystem is better than the RSA Cryptosystem for mental poker." 2007. http://etd1.library.duq.edu/theses/available/etd-03192007-133602/unrestricted/TetikogluThesis.pdf.
Full textZHANG, DA-WEI, and 張達維. "A double-lock cryptosystem." Thesis, 1990. http://ndltd.ncl.edu.tw/handle/88171140906011019299.
Full textHuang, Chao-Ping, and 黃昭平. "The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/06595669746730443443.
Full text楊煒傑. "A cryptosystem using matrix transformation." Thesis, 1990. http://ndltd.ncl.edu.tw/handle/76275750579792988232.
Full textHuang, Wei-chih, and 黃暐智. "Chaotic Cryptosystem of Digital Images." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/90379309842508025606.
Full textLo, Chien-Min, and 羅建民. "Public Key Revocation Free Cryptosystem." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/20549579021756000557.
Full textChen, Bi-Hung, and 陳碧弘. "The RSA Cryptosystem over Matrices." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/57940589980251673943.
Full textPan, Yu-Jen, and 潘友仁. "The implementation of RSA cryptosystem." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/96031291696765382324.
Full textKuo, Yu-Hung, and 郭育宏. "RSA Cryptosystem for Group Broadcast." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/29818530827787016499.
Full textLin, Shih-Chang, and 林世昌. "Improving the Asymmetric Rabin Cryptosystem." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/68204749366781005622.
Full textDash, Sushree Rasmita. "VLSI Implementation of RSA Cryptosystem." Thesis, 2013. http://ethesis.nitrkl.ac.in/4985/1/211EC2078.pdf.
Full textYu, Shih Chieh, and 游士杰. "A Cryptosystem Based on Visual Cryptography." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/78578611784934105156.
Full text"Identity-based cryptography from paillier cryptosystem." 2005. http://library.cuhk.edu.hk/record=b5892374.
Full textHuang, Bo-Ruei, and 黃柏瑞. "Multivariate cryptosystem design and security analysis." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/w94bj7.
Full textChen, Chao-Yang, and 陳昭陽. "Testable Design of RSA Cryptosystem Core." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/21392379361480598782.
Full textHUANG, WEN-YI, and 黃文義. "A conference cryptosystem and VLSI implementation." Thesis, 1987. http://ndltd.ncl.edu.tw/handle/81279134081937135538.
Full textTAO, JIA-KE, and 陶家可. "E-voting by Elliptic Curve Cryptosystem." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/60221516209353476747.
Full textTsai, Bin-Yan, and 蔡秉諺. "Radix-4 Systolic RSA Cryptosystem Chip." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/29133201503068752955.
Full textChen, Chien-Sheng, and 陳健生. "The Study of Group-Oriented Cryptosystem." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/86475706793460891363.
Full textPei-JuanChang and 張珮娟. "Algebraic structures on public key cryptosystem." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/96778340901286656226.
Full textLiu, Ke-Yu, and 劉可玉. "Hardware Implementation of Elliptic Curve Cryptosystem." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/32495500531893434339.
Full textPeng, Yanqun. "High-speed implementation of the RSA cryptosystem." Thesis, 1995. http://hdl.handle.net/1957/35318.
Full textLin, Da, and 林達. "Design of Parallel Elliptic Curve Cryptosystem Processor." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/6p555d.
Full textChung, Jui-Ting, and 鍾瑞婷. "Group-Oriented Cryptosystem Based on Bilinear Pairing." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/57725653473221573077.
Full text