To see the other types of publications on this topic, follow the link: Pseudo Random Key Generator.

Dissertations / Theses on the topic 'Pseudo Random Key Generator'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 34 dissertations / theses for your research on the topic 'Pseudo Random Key Generator.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bakiri, Mohammed. "Hardware implementation of a pseudo random number generator based on chaotic iteration." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD014/document.

Full text
Abstract:
La sécurité et la cryptographie sont des éléments clés pour les dispositifs soumis à des contraintes comme l’IOT, Carte à Puce, Systèm Embarqué, etc. Leur implémentation matérielle constitue un défi en termes de limitation en ressources physiques, vitesse de fonctionnement, capacité de mémoire, etc. Dans ce contexte, comme la plupart des protocoles s’appuient sur la sécurité d’un bon générateur de nombres aléatoires, considéré comme un élément indispensable dans le noyau de sécurité. Par conséquent, le présent travail propose des nouveaux générateurs pseudo-aléatoires basés sur des itérations
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Chunxiao. "Fractional chaotic pseudo-random number generator design and application to image cryptosystem." Electronic Thesis or Diss., Ecole centrale de Nantes, 2022. http://www.theses.fr/2022ECDN0063.

Full text
Abstract:
Dans cette thèse, nous avons utilisé des systèmes chaotiques pour concevoir des générateurs de nombres pseudoaléatoires(PRNG) et appliqué ces derniers aux cryptosystèmes en raison de leurs caractéristiques prometteuses, telles que le caractèrealéatoire et la sensibilité aux conditions initiales. Les systèmes chaotiques fractionnaires, bien que moins discutés que les carteset systèmes chaotiques classiques d’ordre entier, possèdent une complexité inhérente qui apporte de la nouveauté, de la complexité et des clés secrètes supplémentaires à la conception Chaotic PRNG (CPRNG), qui à son tour amél
APA, Harvard, Vancouver, ISO, and other styles
3

Dusitsin, Krid, and Kurt Kosbar. "Accuracy of Computer Simulations that use Common Pseudo-random Number Generators." International Foundation for Telemetering, 1998. http://hdl.handle.net/10150/609238.

Full text
Abstract:
International Telemetering Conference Proceedings / October 26-29, 1998 / Town & Country Resort Hotel and Convention Center, San Diego, California<br>In computer simulations of communication systems, linear congruential generators and shift registers are typically used to model noise and data sources. These generators are often assumed to be close to ideal (i.e. delta correlated), and an insignificant source of error in the simulation results. The samples generated by these algorithms have non-ideal autocorrelation functions, which may cause a non-uniform distribution in the data or noise sign
APA, Harvard, Vancouver, ISO, and other styles
4

Baweja, Randeep Singh. "FPGA Implementation of a Pseudo-Random Aggregate Spectrum Generator for RF Hardware Test and Evaluation." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/100325.

Full text
Abstract:
Test and evaluation (TandE) is a critically important step before in-the-field deployment of radio-frequency (RF) hardware in order to assure that the hardware meets its design requirements and specifications. Typically, TandE is performed either in a lab setting utilizing a software simulation environment or through real-world field testing. While the former approach is typically limited by the accuracy of the simulation models (particularly of the anticipated hardware effects) and by non-real-time data rates, the latter can be extremely costly in terms of time, money, and manpower. To build
APA, Harvard, Vancouver, ISO, and other styles
5

Stewart, Robert Grisham. "A Statistical Evaluation of Algorithms for Independently Seeding Pseudo-Random Number Generators of Type Multiplicative Congruential (Lehmer-Class)." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etd/2049.

Full text
Abstract:
To be effective, a linear congruential random number generator (LCG) should produce values that are (a) uniformly distributed on the unit interval (0,1) excluding endpoints and (b) substantially free of serial correlation. It has been found that many statistical methods produce inflated Type I error rates for correlated observations. Theoretically, independently seeding an LCG under the following conditions attenuates serial correlation: (a) simple random sampling of seeds, (b) non-replicate streams, (c) non-overlapping streams, and (d) non-adjoining streams. Accordingly, 4 algorithms (each sa
APA, Harvard, Vancouver, ISO, and other styles
6

Zouhar, Petr. "Generátor náhodných čísel." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218290.

Full text
Abstract:
The thesis deals with issues of random numbers, their generating and use in cryptography. Introduction of work is aimed to resolution of random number generators and pseudo--random number generators. There is also included often used dividing generators on software and hardware. We mention advantages and disadvantages of each type and area of their use. Then we describe examples of random and pseudorandom numbers, mainly hardware based on physical phenomenon such as the decay of radioactive material or use atmospheric noise. The following part is devoted to suggestion own random number generat
APA, Harvard, Vancouver, ISO, and other styles
7

Marangon, Davide Giacomo. "Improving Quantum Key Distribution and Quantum Random Number Generation in presence of Noise." Doctoral thesis, Università degli studi di Padova, 2015. http://hdl.handle.net/11577/3424117.

Full text
Abstract:
The argument of this thesis might be summed up as the exploitation of the noise to generate better noise. More specifically this work is about the possibility of exploiting classic noise to effectively transmit quantum information and measuring quantum noise to generate better quantum randomness. What do i mean by exploiting classical noise to transmit effectively quantum information? In this case I refer to the task of sending quantum bits through the atmosphere in order set up transmissions of quantum key distribution (QKD) and this will be the subject of Chapter 1 and Chapter 2. In th
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Jinzhong. "Stream Cipher Analysis Based on FCSRs." UKnowledge, 2000. http://uknowledge.uky.edu/gradschool_diss/320.

Full text
Abstract:
Cryptosystems are used to provide security in communications and data transmissions. Stream ciphers are private key systems that are often used to transform large volumn data. In order to have security, key streams used in stream ciphers must be fully analyzed so that they do not contain specific patterns, statistical infomation and structures with which attackers are able to quickly recover the entire key streams and then break down the systems. Based on different schemes to generate sequences and different ways to represent them, there are a variety of stream cipher analyses. The most import
APA, Harvard, Vancouver, ISO, and other styles
9

Muralidharan, Vaishali. "Logic Encryption Using Dynamic Keys." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613751124204643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Masmoudi, Atef. "Elaboration et analyse de nouveaux algorithmes de crypto-compression basés sur le codage arithmétique." Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20197/document.

Full text
Abstract:
Actuellement, nous vivons dans une société numérique. L'avènement de l'Internet et l'arrivée du multimédia et des supports de stockage numériques, ont transformé profondément la façon dont nous communiquons. L'image en particulier occupe une place très importante dans la communication interpersonnelle moderne. Toutefois, elle présente l'inconvénient d'être représentée par une quantité d'information très importante. De ce fait, la transmission et le stockage des images soulèvent certains problèmes qui sont liés essentiellement à la sécurité et à la compression d'images. Ce sont ces considératio
APA, Harvard, Vancouver, ISO, and other styles
11

Novotný, Marek. "Programy pro výpočet nejistoty měření metodou Monte Carlo." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221220.

Full text
Abstract:
The thesis deals with establishing uncertainties of indirect measurements. It focuses primarily on random number generators in software enabling the calculation of mea-surement uncertainties using Monte Carlo. Then it focuses on the uncertainty calculati-on indirect measurement as the Monte Carlo method and the classical numerical met-hod. The practical part deals with the verification of randomness generators numbers contained in various softwares. It also deals with the determination of uncertainties indi-rect current measurements by both above-mentioned methods and then comparing and evalua
APA, Harvard, Vancouver, ISO, and other styles
12

Matoušek, Jiří. "Network Traffic Simulation and Generation." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-412835.

Full text
Abstract:
Development of computer networks able to operate at the speed of 10 Gb/s imposes new requirements on newly developed network devices and also on a process of their testing. Such devices are tested by replaying synthetic or previously captured network traffic on an input link of the tested device. We must be able to perform both tasks also at full wire speed. Current testing devices are either not able to operate at the speed of 10 Gb/s or they are too expensive. Therefore, the aim of this thesis is to design and implement a hardware accelerated application able to generate and replay network t
APA, Harvard, Vancouver, ISO, and other styles
13

Leifgen, Matthias. "Protocols and components for quantum key distribution." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät, 2016. http://dx.doi.org/10.18452/17473.

Full text
Abstract:
In dieser Doktorarbeit werden zwei Konzepte der Quanteninformationsverarbeitung realisiert. Der Quantenschlüsselaustausch ist revolutionär, weil er perfekte Sicherheit gewährleistet. Zahlreiche Quantenkryptografieprotokolle wurden schon untersucht. Zwei Probleme bestehen. Zum einen ist es sehr schwer, die Bedingungen herzustellen, die in den Annahmen für perfekte Sicherheit impliziert sind. Zum anderen sind die Reichweiten auf momentan etwa 200 km begrenzt, aufgrund des abnehmenden Signals gegenüber des konstanten Rauschens. Ein Experiment dieser Doktorarbeit beschäftigt sich mit dem ersten P
APA, Harvard, Vancouver, ISO, and other styles
14

Грицак, Анатолій Васильович, та Anatoliy Hrytsak. "Методи побудови ефективних криптографічних функцій гешування". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44653.

Full text
Abstract:
Дисертаційна робота присвячена розв’язанню актуальної наукової задачі розробки та дослідження нових ефективних геш-функцій, які при достатньо високій швидкодії забезпечуватимуть необхідний рівень стійкості. Проведено аналіз сучасних методів і алгоритмів побудови та реалізації ефективних криптографічних функцій гешування, що дозволило виявити їх недоліки і формалізувати завдання наукового дослідження. Розроблено методи побудови функцій гешування, які дозволили підвищити стійкість і швидкість криптографічної обробки даних. Удосконалено метод побудови генераторів ПВП, що дозволило формувати стати
APA, Harvard, Vancouver, ISO, and other styles
15

Kuppusamy, Lakshmi Devi. "Modelling client puzzles and denial-of-service resistant protocols." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61032/1/Lakshmi_Kuppusamy_Thesis.pdf.

Full text
Abstract:
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs o
APA, Harvard, Vancouver, ISO, and other styles
16

Noumon, Allini Elie. "Caractérisation, évaluation et utilisation du jitter d'horloge comme source d'aléa dans la sécurité des données." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES019.

Full text
Abstract:
Cette thèse, financée par la DGA, est motivée par la problématique d’évaluation des TRNG pour des applications à très haut niveau de sécurité. Les standards actuels tels que AIS-31 n’étant pas suffisants pour ces types d’applications, la DGA propose une procédure complémentaire, validée sur les TRNG utilisant les oscillateurs en anneau (RO), qui vise à caractériser la source d’aléa des TRNG afin d’identifier les bruits électroniques présents dans celle-ci. Ces bruits se traduisent dans les circuits numériques par le jitter d’horloge générée dans les RO. Ils peuvent être caractérisés par leur d
APA, Harvard, Vancouver, ISO, and other styles
17

Ващенко, Світлана Михайлівна, Светлана Михайловна Ващенко, Svitlana Mykhailivna Vashchenko, and A. V. Sobol. "Information System of Test Monitoring of Students' Knowledge." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/47039.

Full text
Abstract:
The work is dedicated to the improvement of the test control technology of mastering the educational material by the students. To achieve this the information system of tests formation has been worked out. The increasing of the variability of tasks is provided by the use of linear congruent method of pseudo-random numbers generating.
APA, Harvard, Vancouver, ISO, and other styles
18

Bayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.

Full text
Abstract:
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective
APA, Harvard, Vancouver, ISO, and other styles
19

Arolla, Srihari, and Naga Venkata Sai Teja Gurrala. "PHYSICAL LAYER SECURITY USING PSEUDO-RANDOM SEQUENCE KEY GENERATION." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16195.

Full text
Abstract:
Nowadays, network security plays a major role in the field of wireless communications. Wired networks propagate electrical signals or pulses through cables. Whereas wireless signals propagate through the air. If wireless networks are left open and exposed to the outside world, there are high chances of being misused by others. The intruders take advantage of this, to intercept the wireless signals. This is the reason why an extra level of security is required for wireless networks. The physical layer is one of the important layers of the Open System Interconnection (OSI) model which plays an i
APA, Harvard, Vancouver, ISO, and other styles
20

Kuo, Chi-Yuan, and 郭啟源. "A Chaotic Pseudo Random Number Generator." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/kj6vje.

Full text
Abstract:
碩士<br>中原大學<br>電機工程研究所<br>91<br>Abstract The use of chaotic sequences in digital communication is proposed. In arriving these new sequences, the theory of chaotic has been used. Unlike the conventional PN sequences, which are easily intercepted and deciphered, the chaotic pseudo random numbers offers opportunities for improvement based on its chaotic nature in several aspects. First of all, chaotic sequences are easy to generate and store. Only a few parameters and functions are needed even for very long sequences. In addition, an enormous number of different sequences can be generate
APA, Harvard, Vancouver, ISO, and other styles
21

Weng, Chih-Chi, and 翁志齊. "High-Speed Pseudo Random Binary Sequence Generator." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/13756496845238039684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Lee, Chun-I., and 李君毅. "Platform study of double scroll chaotic pseudo random bit generator." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/24033430862180397227.

Full text
Abstract:
碩士<br>東南技術學院<br>機電整合研究所<br>95<br>This thesis introduces the chaotic characteristic at first, it is a highly complicated nonlinearity , the dynamic behavior that appears is contradiction , noise like, similar to stochastic process but deterministic system , Traditional pseudo random bit generator is build in mathematic algorithm , bye way of choosing parameter properly the random bit can be produced, However, after at parameter is fixed, the bit no longer change , so have easy intercepting and shortcoming deciphered , In order to improve shortcomings that mention above, we applied chaotic theor
APA, Harvard, Vancouver, ISO, and other styles
23

Ramakrishnan, Karthik. "Wireless network security using a low cost pseudo random number generator." 2006. http://proquest.umi.com/pqdweb?did=1172122391&sid=10&Fmt=2&clientId=39334&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (M.S.)--State University of New York at Buffalo, 2006.<br>Title from PDF title page (viewed on Mar. 08, 2007) Available through UMI ProQuest Digital Dissertations. Thesis adviser: Sridhar, Ramalingam, Upadhyaya, Shambhu. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Po Han, and 李柏翰. "Implementation of chaotic stream ciphers using chaotic pseudo-random number generator." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/47247003253993049254.

Full text
Abstract:
碩士<br>國立臺灣大學<br>物理學研究所<br>87<br>Cryptographic systems are generally classified into block and stream ciphers.The cryptosystem CSC, chaotic stream ciphers, of combining a pseudo-random number generator of chaotic system with classic cryptography has been presented. A chaotic dynamical system means that the numerical trajectory in the phase space exhibits the phenomenon of aperiodic, complicated, and sensible dependence on initial conditions. We describe a simple random number generator based on the chaotic property of the Lorenz system. The random numbers generated by the Lorenz syst
APA, Harvard, Vancouver, ISO, and other styles
25

陳泓志. "Design of Pseudo-Random Bit Sequence Generator Circuits with Built-in Clock." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/c5v4j8.

Full text
Abstract:
碩士<br>國立高雄應用科技大學<br>電子工程系<br>105<br>In this thesis, two pseudo-random bit sequence (PRBS) generators and a three-stage ring voltage control oscillator were designed in TSMC 0.18mm complementary metal-oxide-semiconductor (CMOS) process. The sequence length of the PRBS generators with built-in clock was designed as 27-1. Using current-mode logic (CML) circuit structure, the PRBS generators can be operated at higher rate. The first PRBS generator used a linear feedback shift register structure, the operation rate of the circuit is 3-Gbps, the power consumption is 221.639 mW, and the chip area is
APA, Harvard, Vancouver, ISO, and other styles
26

LI, WEI-CHEN, and 李緯宸. "Design and Fabrication of High-Speed Pseudo-Random Bit Sequence Generator and Checker." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/59899987278825611134.

Full text
Abstract:
碩士<br>國立高雄應用科技大學<br>電子工程系碩士班<br>104<br>In this thesis, pseudo-random bit sequence (PRBS) generator and PRBS checker integrated circuits and LC-tank voltage controlled oscillator (VCO) were designed in TSMC 90nm complementary metal-oxide-semiconductor (CMOS) process. The PRBS checker which can detect error bits and the PRBS generator which can add error bits are designed. The PRBS generator and checker circuits are integrated in a chip for bit error measurement. The chip can be applied in bit error testing for 2^7-1 sequence length, its operation rate is at 10Gb/s, its total power consumption i
APA, Harvard, Vancouver, ISO, and other styles
27

Chen, Jiung-Sheng, and 陳俊晟. "A 32-bit Chaos-Based Pseudo Random Number Generator by Injecting Digital Noise." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/92579125861284269402.

Full text
Abstract:
碩士<br>國立清華大學<br>電機工程學系<br>93<br>Random number generator (RNG) is an important part of communication and protocols in cryptography. It generates the cryptography keys and initial numbers, and also could be used in any application that needs the random value. It is hard to define a good RNG design by the unpredictable character or by the statistical test result. To be unpredictable, the analog RNG is chosen. However, the influence from different environments would cause uncontrollable quality of RNG. To be good in statistical test result, the digital RNG is chosen. Thus the random output
APA, Harvard, Vancouver, ISO, and other styles
28

Huang, Chih Ming, and 黃志銘. "Pseudo Random Number Generator with On-Line Testing Scheme using Carry-Lookahead Parity Prediction." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/r8nn72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

"Study on elliptic curve public key cryptosystems with application of pseudorandom number generator." 1998. http://library.cuhk.edu.hk/record=b5889523.

Full text
Abstract:
by Yuen Ching Wah.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 1998.<br>Includes bibliographical references (leaves 61-[63]).<br>Abstract also in Chinese.<br>Chapter 1 --- Introduction --- p.1<br>Chapter 1.1 --- Why use cryptography? --- p.1<br>Chapter 1.2 --- Why is authentication important ? --- p.2<br>Chapter 1.3 --- What is the relationship between authentication and digital sig- nature? --- p.3<br>Chapter 1.4 --- Why is random number important? --- p.3<br>Chapter 2 --- Background --- p.5<br>Chapter 2.1 --- Cryptography --- p.5<br>Chapter 2.1.1 --- Symmetric key cryptograp
APA, Harvard, Vancouver, ISO, and other styles
30

Aytimur, Cenk. "Design and Implementation of a Programmable Digital Pseudo-Random Bit Generator for Applications in Noise Radar." Thesis, 2013. http://hdl.handle.net/1974/8447.

Full text
Abstract:
Noise radar systems have become more prevalent over the past couple of decades due to their superior performance over conventional continuous-wave and pulsed-wave radar systems in certain applications. However, one limiting factor of noise radar systems has been the generation of ultrabroadband waveforms. This thesis proposes a novel application of programmable pseudo-random bit generators (PRBGs) for use in noise radar applications. A long-sequence high-speed PRBG was designed using a low-cost and low-power complementary metal oxide semiconductor (CMOS) technology. The proposed circuit ha
APA, Harvard, Vancouver, ISO, and other styles
31

Lai, Hane-Ru, and 賴漢儒. "An Alternate Twofish Cipher with Variable S-boxes Sequence Determined by a Pseudo-Random Number Generator." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/49052053040191068843.

Full text
Abstract:
碩士<br>國立臺北大學<br>通訊工程研究所<br>94<br>Encryption/Decryption is the key technique in the study of Information Security and Cryptography. Twofish, a 128-bit block cipher with a variable-length of the key up to 256 bits, is one of the five final candidates of the Advanced Encryption Standard (AES). Twofish is a 128-bit symmetric block cipher based on the structure of the Feistel network. Twofish cipher consists of 16 round operations each with a bijective F function to ensure maximum security. In each round, four key-dependent 8×8 S-boxes, a fixed 4×4 Maximal Distance Separable Matrix (MDS) over GF(28
APA, Harvard, Vancouver, ISO, and other styles
32

Jiang, Fu-Yun, and 江福運. "Design of 5 Gb/s Pseudo-Random Bit Sequence Generator and Checker Circuits Using MOS Current Mode Logic." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/65978203555915368019.

Full text
Abstract:
碩士<br>國立高雄應用科技大學<br>電子工程系碩士班<br>103<br>In this thesis, two pseudo-random bit sequence (PRBS) generators with selectable sequence length and a PRBS checker were designed in TSMC 0.18μm complementary metal-oxide-semiconductor (CMOS) process. Using a 2×1 selector to choose the feedback path, the PRBS generators can generate the PRBS signal with different sequence length. Using current-mode logic (CML) D-type flip-flop (DFF), the PRBS generators can be operated at higher rate. The sequence length of the first PRBS generator can select 27-1 or 210-1, the circuit can be operated at 5 Gb/s, the power
APA, Harvard, Vancouver, ISO, and other styles
33

Wu, Chih-Lung, and 吳志榮. "A Study on Dynamic Session Key Exchange with Pseudo Random Number Scheme in a Cloud Computing Environment." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/34595755674316429273.

Full text
Abstract:
碩士<br>國防大學管理學院<br>資訊管理學系<br>100<br>According to the universality of the Internet, the information exchange is more convenient. Regardless of the enterprise, government, academic organizations, and the educational units, there are more and more digital data exchange through the internet. But in the transmission process, the viruses, crackers, eavesdropping, replay attacks etc. are the growing threats to the information security. Therefore, to prevent the various kinds of malicious attacks in the internet, such as using eavesdropping and detection technique to get, eavesdrop and modify the data.
APA, Harvard, Vancouver, ISO, and other styles
34

Haw, Jing Yan. "Continuous Variable Optimisation of Quantum Randomness and Probabilistic Linear Amplification." Phd thesis, 2018. http://hdl.handle.net/1885/143588.

Full text
Abstract:
In the past decade, quantum communication protocols based on continuous variables (CV) has seen considerable development in both theoretical and experimental aspects. Nonetheless, challenges remain in both the practical security and the operating range for CV systems, before such systems may be used extensively. In this thesis, we present the optimisation of experimental parameters for secure randomness generation and propose a non-deterministic approach to enhance amplification of CV quantum state. The first part of this thesis examines the s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!