Dissertations / Theses on the topic 'Data encryption (Computer science) Polynomials'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Data encryption (Computer science) Polynomials.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Jones, John W. "Data encryption based on the logarithm problem." Thesis, University of Ottawa (Canada), 1986. http://hdl.handle.net/10393/4825.
Full textYu, Lingfeng. "Multidimensional data encryption with virtual optics /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?MECH%202003%20YU.
Full textClevenger, Mark Allen. "Data encryption using RSA public-key cryptosystem." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1014844.
Full textDepartment of Computer Science
Cash, Charles David. "On the security and efficiency of encryption." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31733.
Full textCommittee Chair: Boldreva, Alexandra; Committee Member: Ahamad, Mustaque; Committee Member: Randall, Dana; Committee Member: Tetali, Prasad; Committee Member: Traynor, Patrick. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Griffy, Scott Sherlock. "Crumpled and Abraded Encryption: Implementation and Provably Secure Construction." PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5067.
Full textYi, Shuang. "Reversible data hiding technologies for encrypted images." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3951604.
Full textXia, Ying Han. "Establishing trust in encrypted programs." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24761.
Full textCommittee Chair: Owen, Henry; Committee Co-Chair: Abler, Randal; Committee Member: Copeland, John; Committee Member: Giffin, Jon; Committee Member: Hamblen, Jim.
Norman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Full textManiccam, Suchindran S. "Image-video compression, encryption and information hiding /." Online version via UMI:, 2001.
Find full textTandon, Prateek. "High-performance advanced encryption standard (AES) security co-processor design." Thesis, Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180433/unrestricted/tandon%5fprateek%5f200312%5fms.pdf.
Full textMantzouris, Panteleimon. "Computational algebraic attacks on the Advanced Encryption Standard (AES)." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMantzouris.pdf.
Full textThesis Advisor(s): Canright, David ; Butler, Jon. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Advanced Encryption Standard (AES), Rijndael's algorithm, block cipher, decipher, round of the algorithm, sparse multivariate polynomial. Includes bibliographical references (p. 101). Also available in print.
Roth, Christopher. "A distributed password scheme for network operating systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.
Full textYip, Shu Kei. "Digital watermarking and data hiding /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ECED%202006%20YIP.
Full textLi, Richard Yuk Ming. "Digital watermarking and data hiding /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ECED%202007%20LIR.
Full textLincoln, Laura Beth. "Symmetric private information retrieval via additive homomorphic probabilistic encryption /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/2792.
Full textWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Full textIncludes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
Zhou, Jiantao. "Multimedia lightweight encryption via randomized entropy coding /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?ECED%202009%20ZHOU.
Full textAbdulaziz, Nidhal Kadhim 1958. "Digital watermarking and data hiding in multimedia." Monash University, Dept. of Electrical and Computer Systems Engineering, 2001. http://arrow.monash.edu.au/hdl/1959.1/8047.
Full textSong, Beomsik. "Observations on the cryptologic properties of the AES algorithm." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041028.102719/index.html.
Full textCrumpacker, John R. "Distributed password cracking." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FCrumpacker.pdf.
Full textThesis Advisor(s): Dinolt, George. Second Reader: Eagle, Chris. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Distributed password cracking, Berkeley Open Infrastructure for Network Computing (BOINC), and John the Ripper. Includes bibliographical references (p. 63-64). Also available in print.
Wong, Chung Kei. "Network security services for flows and multicasts /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textBruwer, Christian S. "Correlation attacks on stream ciphers using convolutional codes." Pretoria : [s.n.], 2004. http://upetd.up.ac.za/thesis/available/etd-01242006-090544.
Full textJiang, Zi Yu. "Digital watermarking methods with robustness and reversibility." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3869193.
Full textChang, Ching-Yun. "Transformations for linguistic steganography." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648405.
Full textFu, Ming Sun. "Data hiding watermarking for halftone images /." View abstract or full-text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20FU.
Full textRogers, Jason Lee. "Secure distribution of open source information." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FRogers.pdf.
Full textSalles, Ernesto J. "The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FSalles.pdf.
Full textThesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
Barnes, Wayne. "Synchronization of chaotic circuits through real channels." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-03302010-020407/.
Full textZhang, Zheshen. "Quantum key distribution protocols with high rates and low costs." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28240.
Full textChan, Fuk Wing Thomas. "Preserving trust across multiple sessions in open systems /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd497.pdf.
Full textHoltje, Carl. "Security in serverless network environments /." Link to online version, 2004. https://ritdml.rit.edu/dspace/handle/1850/439.
Full textChen, Qian. "Query authentication in data outsourcing and integration services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/167.
Full textQi, Hui. "Multi-polynomial higher order neural network group models for financial data and rainfall data simulation & prediction /." View thesis View thesis, 2001. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030328.121924/index.html.
Full text"A thesis presented to the Department of Computing and Information Systems, University of Western Sydney, Macarthur in partial fulfilment of the requirements for the degree of Master of Science (Honours)" Bibliography : leaves 129-139.
Kaptanoǧlu, Tiǧin. "Performance evaluation of eXtended sparse linearization in GF(2) and GR(2⁸) /." Online version of thesis, 2007. http://hdl.handle.net/1850/5072.
Full textChenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.
Full textArslanian, Samuel Thomas. "An implementation of the El Gamal elliptic curve cryptosystem over a finite field of characteristic P." Fogler Library, University of Maine, 1998. http://www.library.umaine.edu/theses/pdf/ArslanianST1998.pdf.
Full textDelman, Bethany. "Genetic algorithms in cryptography /." Link to online version, 2003. https://ritdml.rit.edu/dspace/handle/1850/263.
Full textWozny, Peter. "Elliptic curve cryptography: generation and validation of domain parameters in binary Galois Fields /." Online version of thesis, 2008. http://hdl.handle.net/1850/9695.
Full textMutsuddi, Monoreet. "Smart card enabled security services to support secure telemedicine applications." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1213.
Full textTitle from document title page. Document formatted into pages; contains vi, 70 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 70-71).
Yan, Chenyu. "Architectural support for improving security and performance of memory sub-systems." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26663.
Full textCommittee Chair: Milos Prvulovic; Committee Member: Gabriel Loh; Committee Member: Hyesoon Kim; Committee Member: Umakishore Ramachandran; Committee Member: Yan Solihin. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Venema, Jacob Paul Shu Jonathan Lee Yee. "Investigation into the impacts of migration to emergent NSA Suite B encryption standards." Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Jun/09Jun%5FVenema.pdf.
Full textThesis Advisor(s): Fulp, John D. ; Riehle, Richard. "June 2009." Description based on title screen as viewed on July 14, 2009. Author(s) subject terms: elliptical curve cryptography, ECC, Rivest Shamir and Adleman, RSA, NSA Suite B, encryption, digital signature, key agreement, ECC migration, risk mitigation. Includes bibliographical references (p. 95-98). Also available in print.
Kumar, Virendra. "Provable security support for kerberos (and beyond)." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44722.
Full textOkere, Irene Onyekachi. "A control framework for the assessment of information security culture." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1019861.
Full textYuan, Jin. "Secret sharing schemes from linear codes /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20YUAN.
Full textLeung, Wing Pan. "Visual cryptography for color images : formal security analysis and new construction /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b23759100f.pdf.
Full text"Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy." Includes bibliographical references (leaves 103-108)
Smith, Bryan. "Responding to policies at runtime in TrustBuilder /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd414.pdf.
Full textHuang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks An-Lun (Alan) Huang." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-05052008-110318/.
Full textLathrop, Joel. "Cube attacks on cryptographic hash functions /." Online version of thesis, 2009. http://hdl.handle.net/1850/10821.
Full textSmith, Kenneth James. "Methodologies for power analysis attacks on hardware implementations of AES /." Online version of thesis, 2009. http://hdl.handle.net/1850/10751.
Full textMiklau, Gerome. "Confidentiality and integrity in distributed data exchange /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.
Full text