Dissertations / Theses on the topic 'Hash function cryptographic'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Hash function cryptographic.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Guo, Xu. "Secure and Efficient Implementations of Cryptographic Primitives." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/27702.
Full textChuah, Chai Wen. "Key derivation function based on stream ciphers." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/71025/1/Chai%20Wen_Chuah_Thesis.pdf.
Full textKarásek, Jan. "Hashovací funkce - charakteristika, implementace a kolize." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218059.
Full textCochran, Martin J. "Cryptographic hash functions." Connect to online resource, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3303860.
Full textAl-Kuwari, Saif. "Integrated-key cryptographic hash functions." Thesis, University of Bath, 2011. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.545328.
Full textShrimpton, Thomas Eric. "Provably-secure cryptographic hash functions /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2004. http://uclibs.org/PID/11984.
Full textSaarinen, markku-Juhani Olavi. "Cryptanalysis of dedicated cryptographic hash functions." Thesis, University of London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537512.
Full textLathrop, Joel. "Cube attacks on cryptographic hash functions /." Online version of thesis, 2009. http://hdl.handle.net/1850/10821.
Full textGauravaram, Praveen Srinivasa. "Cryptographic hash functions : cryptanalysis, design and applications." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16372/.
Full textKasselman, Pieter Retief. "Analysis and design of cryptographic hash functions." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-12202006-125340/.
Full textGauravaram, Praveen. "Cryptographic hash functions : cryptanalysis, design and applications." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16372/1/Praveen_Gauravaram_Thesis.pdf.
Full textHalunen, K. (Kimmo). "Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions." Doctoral thesis, Oulun yliopisto, 2012. http://urn.fi/urn:isbn:9789514299667.
Full textLegendre, Florian. "Exploitation de la logique propositionnelle pour la résolution parallèle des problèmes cryptographiques." Thesis, Reims, 2014. http://www.theses.fr/2014REIMS006/document.
Full textBen, Hamouda-Guichoux Fabrice. "Diverse modules and zero-knowledge." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE022/document.
Full textKarpman, Pierre. "Analyse de primitives symétriques." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX095/document.
Full textBourse, Florian. "Functional encryption for inner-product evaluations." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE067/document.
Full textAbidin, Aysajan. "Weaknesses of Authentication inQuantum Cryptography and Strongly Universal Hash Functions." Licentiate thesis, Linköping University, Linköping University, Department of Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57290.
Full textJean, Jérémy. "Cryptanalyse de primitives symétriques basées sur le chiffrement AES." Phd thesis, Ecole Normale Supérieure de Paris - ENS Paris, 2013. http://tel.archives-ouvertes.fr/tel-00911049.
Full textAbidin, Aysajan. "Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions." Licentiate thesis, Linköpings universitet, Tillämpad matematik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-57290.
Full textLIMA, José Paulo da Silva. "Validação de dados através de hashes criptográficos: uma avaliação na perícia forense computacional brasileira." Universidade Federal de Pernambuco, 2015. https://repositorio.ufpe.br/handle/123456789/15966.
Full textSiltu, (celebi) Tugba. "Design And Fpga Implementation Of Hash Processor." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609078/index.pdf.
Full textSulak, Fatih. "Statistical Analysis Of Block Ciphers And Hash Functions." Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613045/index.pdf.
Full textDu, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.
Full textDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Full textAbdoun, Nabil. "Design, implementation and analysis of keyed hash functions based on chaotic maps and neural networks." Thesis, Nantes, 2019. http://www.theses.fr/2019NANT4013/document.
Full textKortelainen, T. (Tuomas). "On iteration-based security flaws in modern hash functions." Doctoral thesis, Oulun yliopisto, 2014. http://urn.fi/urn:isbn:9789526206431.
Full textGraff, Nathaniel. "Differential Power Analysis In-Practice for Hardware Implementations of the Keccak Sponge Function." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1838.
Full textTomaz, Antonio Emerson Barros. "Resgate de autoria em esquemas de assinatura em anel." reponame:Repositório Institucional da UFC, 2014. http://www.repositorio.ufc.br/handle/riufc/10842.
Full textSchmied, Jan. "GPU akcelerované prolamování šifer." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236071.
Full textTucker, Ida. "Chiffrement fonctionnel et signatures distribuées fondés sur des fonctions de hachage à projection, l'apport des groupes de classe." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEN054.
Full textDevulapalli, Venkata Lakshmi Narasimha. "Application of Huffman Data Compression Algorithm in Hashing Computation." TopSCHOLAR®, 2018. https://digitalcommons.wku.edu/theses/2614.
Full textČlupek, Vlastimil. "Autentizace s využitím lehké kryptografie." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-256563.
Full textBeran, Martin. "Elektronická podatelna VUT 2." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2007. http://www.nusl.cz/ntk/nusl-412777.
Full textMahdal, Jakub. "Bezpečné kryptografické algoritmy." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235972.
Full textHauserová, Markéta. "Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236445.
Full textNoumon, Allini Elie. "Caractérisation, évaluation et utilisation du jitter d'horloge comme source d'aléa dans la sécurité des données." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES019.
Full textMarček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Full textDoležel, Radek. "Návrh bezpečnostní infrastruktury elektronického archivu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218135.
Full textShih, He-Yuan, and 石賀源. "On the Security and Performance of Cryptographic Hash Function SHA-3." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/vsabkh.
Full textSeidlová, Monika. "Algebraicko-diferenční analýza Keccaku." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-345480.
Full textKasselman, Pieter Retief. "Analysis and design of cryptographic hash functions." Diss., 1999. http://hdl.handle.net/2263/30448.
Full textSayilar, Gokhan. "Cryptoraptor : high throughput reconfigurable cryptographic processor for symmetric key encryption and cryptographic hash functions." Thesis, 2014. http://hdl.handle.net/2152/28267.
Full textUpadhyay, Jalaj. "Generic Attacks on Hash Functions." Thesis, 2010. http://hdl.handle.net/10012/5527.
Full textJuliato, Marcio. "Fault Tolerant Cryptographic Primitives for Space Applications." Thesis, 2011. http://hdl.handle.net/10012/5876.
Full textRosen, Andrew. "Towards a Framework for DHT Distributed Computing." 2016. http://scholarworks.gsu.edu/cs_diss/107.
Full textSerrano, Luís Miguel dos Santos. "Hand-based biometric recognition system for mobile devices." Master's thesis, 2011. http://hdl.handle.net/10071/8235.
Full textΜπάρδης, Δημήτριος. "Ανάπτυξη σε FPGA κρυπτογραφικού συστήματος για υλοποίηση της JH hash function". Thesis, 2012. http://hdl.handle.net/10889/5288.
Full textΚομηνέας, Θεόδωρος. "Σχεδίαση και υλοποίηση σε FPGA, αρχιτεκτονικών πολλαπλών λειτουργιών χαμηλής επιφάνειας ολοκλήρωσης, για κρυπτογραφικές συναρτήσεις κατακερματισμού". Thesis, 2012. http://hdl.handle.net/10889/5427.
Full textZimmermannová, Jana. "Vývoj a využití hašovacích funkcí při zpracování informací." Master's thesis, 2012. http://www.nusl.cz/ntk/nusl-304187.
Full textΕμερετλής, Ανδρέας. "Μεθοδολογία και υλοποίηση secure hash αλγορίθμων σε FPGA". Thesis, 2012. http://hdl.handle.net/10889/5622.
Full text