To see the other types of publications on this topic, follow the link: Encryption module.

Dissertations / Theses on the topic 'Encryption module'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 22 dissertations / theses for your research on the topic 'Encryption module.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Plasencia, Balabarca Frank Pedro. "Functional verification framework of an AES encryption module." Bachelor's thesis, Pontificia Universidad Católica del Perú, 2018. http://tesis.pucp.edu.pe/repositorio/handle/123456789/12409.

Full text
Abstract:
Over the time, the development of the digital design has increased dramatically and nowadays many different circuits and systems are designed for multiple purposes in short time lapses. However, this development has not been based only in the enhancement of the design tools, but also in the improvement of the verification tools, due to the outstanding role of the verification process that certifies the adequate performance and the fulfillment of the requirements. In the verification industry, robust methodologies such as the Universal Verification Methodology (UVM) are used, an example of this
APA, Harvard, Vancouver, ISO, and other styles
2

Watkins, Stan M. "FLEXIBLE SECURE DATA COMMUNICATIONS WITH THE RANGE ENCRYPTION MODULE." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608536.

Full text
Abstract:
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>This paper discusses the design, application and flexibility of the Range Encryption Module (REM) developed by L3 Communications Conic Division for the Range Application Joint Program Office (RAJPO) located at Eglin Air Force Base in Florida. The REM is a burst encrypter that utilizes the National Security Agency Thornton CTIC/DS- 101 Hybrid (CDH) encryption algorithm. The CDH device operates under the control of a Conic-designed digital ASIC. The CDH, ASIC, Power
APA, Harvard, Vancouver, ISO, and other styles
3

Kalibjian, Jeff. "Data Security Architecture Considerations for Telemetry Post Processing Environments." International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.

Full text
Abstract:
Telemetry data has great value, as setting up a framework to collect and gather it involve significant costs. Further, the data itself has product diagnostic significance and may also have strategic national security importance if the product is defense or intelligence related. This potentially makes telemetry data a target for acquisition by hostile third parties. To mitigate this threat, data security principles should be employed by the organization to protect telemetry data. Data security is in an important element of a layered security strategy for the enterprise. The value proposition c
APA, Harvard, Vancouver, ISO, and other styles
4

Demir, Levent. "Module de confiance pour externalisation de données dans le Cloud." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM083/document.

Full text
Abstract:
L’externalisation des données dans le Cloud a engendré de nouvelles problématiques de sécurité. L’enjeu est de protéger les données des utilisateurs et leur vie privée. En ce sens, deux principes ont été suivis durant cette thèse : le premier est d’avoir une confiance limitée envers l’hébergeur de données (entre autres), le deuxième est d’établir une architecture basée sur un modulede confiance placé en rupture entre le poste client et le Cloud, d’où l’approche "Trust The Module,Not The Cloud" (TTM).Déléguer donc les opérations de sécurité à un module matériel dédié permet alors plusieurs béné
APA, Harvard, Vancouver, ISO, and other styles
5

Bitar, Hadi, and Björn Jakobsson. "GDPR: Securing Personal Data in Compliance with new EU-Regulations." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64342.

Full text
Abstract:
New privacy regulations bring new challenges to organizations that are handling and processing personal data regarding persons within the EU. These challenges come mainly in the form of policies and procedures but also with some opportunities to use technology often used in other sectors to solve problems. In this thesis, we look at the new General Data Protection Regulation (GDPR) in the EU that comes into full effect in May of 2018, we analyze what some of the requirements of the regulation means for the industry of processing personal data, and we look at the possible solution of using hard
APA, Harvard, Vancouver, ISO, and other styles
6

Fördős, András. "Kryptoanalýza moderních kryptografických modulů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220407.

Full text
Abstract:
The thesis focuses on power analysis of modern cryptographic modules. The first part contains a brief introduction to the topic of the power side channel and basic methods of analyzes. The text describes the process of comparison of modules and a short description of devices found. In the practical part two modules has been selected for the implementation of the encryption algorithm AES-128. The first module was the chip card Gemalto .NET v2 and the second one was the Raspberry Pi. A workplace has been created for these modules which allowed to measure the power consumption of the algorithm AE
APA, Harvard, Vancouver, ISO, and other styles
7

Lippold, Georg. "Encryption schemes and key exchange protocols in the certificateless setting." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41697/1/Georg_Lippold_Thesis.pdf.

Full text
Abstract:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and s
APA, Harvard, Vancouver, ISO, and other styles
8

Jakubíček, Michal. "Zvukový kodek s podporou zabezpečení pro PBX Asterisk." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220422.

Full text
Abstract:
This thesis is focused on the design of secured audio codec for Asterisk PBX. The first chapter is focused on the basic division of traditional PBX producers and the open source PBX. The second chapter explains the structure of Asterisk PBX and its fundamental difference from a traditional PBX. Asterisk is based on components called modules, therefore the work also deals with the most important modules for operation of exchanges and their division of terms of support and dividing by the type of application and their properties. In this chapter there are described in more detail audio codec A-l
APA, Harvard, Vancouver, ISO, and other styles
9

Bayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.

Full text
Abstract:
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective
APA, Harvard, Vancouver, ISO, and other styles
10

Odyurt, Uraz. "Application of Fuzzy Logic in Identity-Based Cryptography." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134.

Full text
Abstract:
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparis
APA, Harvard, Vancouver, ISO, and other styles
11

Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242/document.

Full text
Abstract:
Les technologies de l'Internet des objets (IdO) et de l'externalisation des services informatiques ont conduit à l'émergence de nouvelles menace sur la vie privée des utilisateurs. Cependant, l'implémentation des moyens de sécurité traditionnels sur les équipements de l'IdO constitue un premier défi lié aux limites de capacités. D'un autre côté, la délégation du traitement et du stockage des données, nous pose le problème de confiance envers les fournisseurs de service.Dans ce contexte, nous avons proposé une solution de chiffrement qui assure une protection de données centrée sur leurs propri
APA, Harvard, Vancouver, ISO, and other styles
12

Suriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.

Full text
Abstract:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least
APA, Harvard, Vancouver, ISO, and other styles
13

Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242.

Full text
Abstract:
Les technologies de l'Internet des objets (IdO) et de l'externalisation des services informatiques ont conduit à l'émergence de nouvelles menace sur la vie privée des utilisateurs. Cependant, l'implémentation des moyens de sécurité traditionnels sur les équipements de l'IdO constitue un premier défi lié aux limites de capacités. D'un autre côté, la délégation du traitement et du stockage des données, nous pose le problème de confiance envers les fournisseurs de service.Dans ce contexte, nous avons proposé une solution de chiffrement qui assure une protection de données centrée sur leurs propri
APA, Harvard, Vancouver, ISO, and other styles
14

Marion, Damien. "Multidimensionality of the models and the data in the side-channel domain." Thesis, Paris, ENST, 2018. http://www.theses.fr/2018ENST0056/document.

Full text
Abstract:
Depuis la publication en 1999 du papier fondateur de Paul C. Kocher, Joshua Jaffe et Benjamin Jun, intitulé "Differential Power Analysis", les attaques par canaux auxiliaires se sont révélées être un moyen d’attaque performant contre les algorithmes cryptographiques. En effet, il s’est avéré que l’utilisation d’information extraite de canaux auxiliaires comme le temps d’exécution, la consommation de courant ou les émanations électromagnétiques, pouvait être utilisée pour retrouver des clés secrètes. C’est dans ce contexte que cette thèse propose, dans un premier temps, de traiter le problème d
APA, Harvard, Vancouver, ISO, and other styles
15

Marion, Damien. "Multidimensionality of the models and the data in the side-channel domain." Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0056.

Full text
Abstract:
Depuis la publication en 1999 du papier fondateur de Paul C. Kocher, Joshua Jaffe et Benjamin Jun, intitulé "Differential Power Analysis", les attaques par canaux auxiliaires se sont révélées être un moyen d’attaque performant contre les algorithmes cryptographiques. En effet, il s’est avéré que l’utilisation d’information extraite de canaux auxiliaires comme le temps d’exécution, la consommation de courant ou les émanations électromagnétiques, pouvait être utilisée pour retrouver des clés secrètes. C’est dans ce contexte que cette thèse propose, dans un premier temps, de traiter le problème d
APA, Harvard, Vancouver, ISO, and other styles
16

LI, JING-WEI, and 李勁緯. "Encryption System Design of Combination WIFI Module and MQTT Communication Protocol." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/e4x3jm.

Full text
Abstract:
碩士<br>醒吾科技大學<br>資訊科技應用系<br>105<br>By the incoming of the IoT (Internet of Things) era, scholars design it aimed at various communication protocols. Recently, the development of MQTT has become an appropriate technique applied on IoT due to its simple, stable output and low cost. Hence, “combined WIFI model and MQTT communication protocol’s encrypted system” is used to integrate smartphones and computer with the MQTT theory in order to achieve instant web page control and monitor system. For example, controlled television, air conditioner, and access card etc. To eventually fulfill home automat
APA, Harvard, Vancouver, ISO, and other styles
17

Hsu, Yi Ching, and 徐意晴. "CAM processing module used in AES structure for Encryption and Decryption implementation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/54058256880787727217.

Full text
Abstract:
碩士<br>國立聯合大學<br>電子工程學系碩士班<br>101<br>In the thesis, the structure of information security system was implemented and to evaluate its performance for the securely data transmit in the network. The Advanced Encryption Standard (AES) with Rijndael algorithm is divided into two major block encryption and decryption which is operated for the iteration and the symmetric password key block cryptography with 128, 196, and 256-bit. The Content Addressable Memory (CAM) is used to realize the Look-Up-Table approach of the Sub-Byte and Inv-Sub-Byte transformation function within the integrated operation mo
APA, Harvard, Vancouver, ISO, and other styles
18

House, Andrew W. H. "Design of a flexible cryptographic hardware module /." 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Hongjen, and 陳宏仁. "A Study On Symmetric Encryption Scheme With Dynamic Data Scramble Module Combination And Pseudo Random Numbers." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/41141923974091451445.

Full text
Abstract:
碩士<br>國防大學管理學院<br>資訊管理學系<br>100<br>Internet security has become a global issue. Usually,a country has more IT applications; it needs pay more attentions to assure information security for its IT applications. Nowadays, many information security attacks from the P.R.C. cyber forces to steal military confidential information. Thus, it is important for us to have a security mechanism to protect confidential information, especially for confidential information in military. Data encryption is the best mechanism to assure confidentiality of classified information. This study proposes a CBC symmetric
APA, Harvard, Vancouver, ISO, and other styles
20

Rodr��guez-Henr��quez, Francisco. "New algorithms and architectures for arithmetic in GF(2[superscript m]) suitable for elliptic curve cryptography." Thesis, 2000. http://hdl.handle.net/1957/32514.

Full text
Abstract:
During the last few years we have seen formidable advances in digital and mobile communication technologies such as cordless and cellular telephones, personal communication systems, Internet connection expansion, etc. The vast majority of digital information used in all these applications is stored and also processed within a computer system, and then transferred between computers via fiber optic, satellite systems, and/or Internet. In all these new scenarios, secure information transmission and storage has a paramount importance in the emerging international information infrastructure, especi
APA, Harvard, Vancouver, ISO, and other styles
21

(11023221), Fahad Salamh. "A 3-DIMENSIONAL UAS FORENSIC INTELLIGENCE-LED TAXONOMY (U-FIT)." Thesis, 2021.

Find full text
Abstract:
Although many counter-drone systems such as drone jammers and anti-drone guns have been implemented, drone incidents are still increasing. These incidents are categorized as deviant act, a criminal act, terrorist act, or an unintentional act (aka system failure). Examples of reported drone incidents are not limited to property damage, but include personal injuries, airport disruption, drug transportation, and terrorist activities. Researchers have examined only drone incidents from a technological perspective. The variance in drone architectures poses many challenges to the current investigati
APA, Harvard, Vancouver, ISO, and other styles
22

Stevens, Charles Cater. "Universal homophonic coding." Diss., 1996. http://hdl.handle.net/10500/16108.

Full text
Abstract:
Redundancy in plaintext is a fertile source of attack in any encryption system. Compression before encryption reduces the redundancy in the plaintext, but this does not make a cipher more secure. The cipher text is still susceptible to known-plaintext and chosen-plaintext attacks. The aim of homophonic coding is to convert a plaintext source into a random sequence by randomly mapping each source symbol into one of a set of homophones. Each homophone is then encoded by a source coder after which it can be encrypted with a cryptographic system. The security of homophonic coding falls into the c
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!