Dissertations / Theses on the topic 'Symmetry key'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Symmetry key.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Reyes, Elisabeth. "Evolutionary history of floral key innovations in angiosperms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS489/document.
Full textAzam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.
Full textTalluri, Sai Raghu. "Towards Designing Energy Efficient Symmetric Key Protocols." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/853.
Full textČanda, Valér. "Scalable symmetric block ciphers based on group bases." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.
Full textGhosh, Debeshi D. "Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10263604.
Full textKamineni, Surya Bharat. "Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6874.
Full textMay, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers." Thesis, Queensland University of Technology, 2002.
Find full textKasparek, Alexander J. "Secure Key Agreement for Wearable Medical Devices." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1333.
Full textHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.
Full textHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.
Full textSaran, Nurdan A. "Time Memory Trade Off Attack On Symmetric Ciphers." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610437/index.pdf.
Full textLafitte, Frédéric. "On the automated verification of symmetric-key cryptographic algorithms: an approach based on SAT-solvers." Doctoral thesis, Universite Libre de Bruxelles, 2017. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/257908.
Full textWitt, Alexander W. "Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/829.
Full textKalibjian, Jeff. "Storage Systems and Security Challenges in Telemetry Post Processing Environments." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606206.
Full textBrandner, Kay [Verfasser], and Udo [Akademischer Betreuer] Seifert. "Universal bounds on efficiency and power of heat engines with broken time-reversal symmetry / Kay Brandner. Betreuer: Udo Seifert." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2015. http://d-nb.info/1075494036/34.
Full textGUPTA, ANANYA. "DECENTRALIZED KEY GENERATION SCHEME FOR CELLULAR-BASED HETEROGENEOUS WIRELESS Ad Hoc NETWORKS." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1153347454.
Full textDiene, Adama. "Structure of Permutation Polynomials." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1123788311.
Full textTunaru, Iulia. "Physical layer secret key generation for decentralized wireless networks." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S081/document.
Full textHe, Bing. "Architecture Design and Performance Optimization of Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1275923221.
Full textNoroozi, Hamid. "Alternative Polynomials for Rijndael : Diffusion Analysis." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36304.
Full textLallemand, Virginie. "Cryptanalyse de chiffrements symétriques." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066657/document.
Full textOdland, Tove. "On Methods for Solving Symmetric Systems of Linear Equations Arising in Optimization." Doctoral thesis, KTH, Optimeringslära och systemteori, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166675.
Full textMarriere, Nicolas. "Cryptanalyse de chiffrements par blocs avec la méthode des variances." Thesis, Cergy-Pontoise, 2017. http://www.theses.fr/2017CERG0922/document.
Full textConnolly, Aisling. "Try Again. Fail Again. Fail Better : New notions of security, broken assumptions, and increased efficiency in cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2019. http://www.theses.fr/2019PSLEE034.
Full textLallemand, Virginie. "Cryptanalyse de chiffrements symétriques." Electronic Thesis or Diss., Paris 6, 2016. http://www.theses.fr/2016PA066657.
Full textCarter, Gary Peter. "The design, analysis and categorization of block ciphers and their components." Thesis, Queensland University of Technology, 1999.
Find full textСамойлик, Євген Олександрович, та Yevgen Samoylik. "Лексикографічні методи захисту мовної інформації". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44637.
Full textPortella, Rodrigo. "Balancing energy, security and circuit area in lightweight cryptographic hardware design." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE036/document.
Full textShin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.
Full textMarček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Full textZ'aba, Muhammad Reza. "Analysis of linear relationships in block ciphers." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/35725/1/Muhammad_Z%27aba_Thesis.pdf.
Full textBoiko, А., V. Shendryk, and L. Cherednichenko. "Verification of Cryptosystems Sustainability as the Main Criterion for Development of Common Information Security Policy." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/55749.
Full textCoggia, Daniel. "Techniques de cryptanalyse dédiées au chiffrement à bas coût." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS217.
Full textKiely, Yagan M. "An exploration of octatonicism: From Liszt to Takemitsu." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2534.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textKircanski, Aleksandar. "Cryptanalysis of symmetric key primitives." Thesis, 2009. http://spectrum.library.concordia.ca/976777/1/MR63043.pdf.
Full textGiri, Naresh Kumar. "A dependable and secure approach for secret key establishment and operation in automotive CPS." Thesis, 2018. http://hdl.handle.net/2097/39137.
Full textEsmaeili, Salehani Yaser. "Side Channel Attacks on Symmetric Key Primitives." Thesis, 2011. http://spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani_MASc_F2011.pdf.
Full textShun-WenYeh and 葉舜文. "Blockchain-based Symmetric-key Direct Digital Signature Scheme and Its Application." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/745fqh.
Full textSayilar, Gokhan. "Cryptoraptor : high throughput reconfigurable cryptographic processor for symmetric key encryption and cryptographic hash functions." Thesis, 2014. http://hdl.handle.net/2152/28267.
Full textMa, X., H. Song, J. Wang, J. Gao, and Geyong Min. "A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks." 2014. http://hdl.handle.net/10454/10728.
Full textSwaroop, D. "Anonymity With Authenticity." Thesis, 2011. https://etd.iisc.ac.in/handle/2005/2374.
Full textSwaroop, D. "Anonymity With Authenticity." Thesis, 2011. http://etd.iisc.ernet.in/handle/2005/2374.
Full textAbubaker, Sarshad. "Probabilistic, lightweight cryptosystems based on finite automata." Thesis, 2011. http://hdl.handle.net/1828/3410.
Full textCheng, Yen-hung, and 鄭彥鴻. "One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/23549679550177628322.
Full textMyhr, Geir Ove [Verfasser]. "Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing / vorgelegt von Geir Ove Myhr." 2010. http://d-nb.info/101141323X/34.
Full textLin, Chun-Fang, and 林椿芳. "Research and Implementation of E-Voting System with IC Cards and ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37609861755636278972.
Full textChang, Yuan-Kang, and 張元康. "A C2-Symmetric Chiral Pool Based Flexible Strategy: Concise Synthesis of COTC-Np, (+)-MK7607, (+)-Lycoricidine, (+)-Valienamine, Key Intermediate of (+)-Pancratistatin, and Conduramines A-1 and E." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/s87qbg.
Full textZaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications." Thesis, 2010. http://hdl.handle.net/10012/5532.
Full textLo, Hong-Jay, and 駱宏杰. "A C2-Symmetric Chiral Pool Based Flexible Strategy: Concise Synthesis of (+)-Valienamine, (+)-Valiolamine, 1-epi-(+)-MK7607, 1-epi-(-)-Streptol, (-)-Hygromycin A, Conduramine B-1, C-1, C-4, D-1, F-1, and F-4, and Key Intermediate of (-)-Laminitol." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/kg5n6m.
Full text