To see the other types of publications on this topic, follow the link: Symmetry key.

Dissertations / Theses on the topic 'Symmetry key'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Symmetry key.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Reyes, Elisabeth. "Evolutionary history of floral key innovations in angiosperms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS489/document.

Full text
Abstract:
Les Angiospermes forment un clade connu pour sa grande diversité d’espèces et une répartition inégale de cette diversité en son sein. Ce travail se concentre sur la reconstruction d’états ancestraux de caractères floraux sur les phylogénies dans le but d’étudier leur impact sur la diversification. En premier lieu, nous nous sommes focalisés sur deux innovations-clés potentielles chez les Proteaceae, la symétrie bilatérale du périanthe et la présence dans les hotspots à climat méditerranéen. L’utilisation sur une phylogénie de modèles de diversification dépendants des états de caractère a permi
APA, Harvard, Vancouver, ISO, and other styles
2

Azam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.

Full text
Abstract:
In recent times the usage of smart phones has significantly increased. Businesses are transforming to make more out of smart phones. As a consequence, there is an increasing demand to have more and more mobile applications. Among other areas, mobile applications are also being used to make financial transactions. Applications used for financial transactions need to be more reliable and have end-to-end security. To implement security we heavily depend on cryptography and the heart of cryptography is the keys which are used in cryptographic processes (encryption/decryption). Therefore, it is ess
APA, Harvard, Vancouver, ISO, and other styles
3

Talluri, Sai Raghu. "Towards Designing Energy Efficient Symmetric Key Protocols." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/853.

Full text
Abstract:
Energy consumption by various modern symmetric key encryption protocols (DES, 3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work is directed towards redesigning or modifying the underlying algorithms for these protocols to make them consume less energy than they currently do. This research takes the approach of reducing energy consumption by parallelizing the consecutive memory accesses of symmetric key encryption algorithms. To achieve parallelization, an existing energy complexity model is applied to symmetric key encryption algorithms. Inspired by the popular DDR
APA, Harvard, Vancouver, ISO, and other styles
4

Čanda, Valér. "Scalable symmetric block ciphers based on group bases." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ghosh, Debeshi D. "Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10263604.

Full text
Abstract:
<p> Watermarking is the process of embedding information into a carrier signal such as audio, video, and images. It is widely used to protect proprietary information in the signal to prevent information theft or duplicity. In this project, an audio watermarking system with dual layer security has been implemented. The entire system is divided into two sections that are independent, but have been combined, to make a unique system that provides increased levels of robustness. The first part of the project involves encrypting an embedded image (watermark) using the XOR method of symmetric key cry
APA, Harvard, Vancouver, ISO, and other styles
6

Kamineni, Surya Bharat. "Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6874.

Full text
Abstract:
In this thesis, we present results of an experimental study in order to generate a secure cryptographic key from the user’s voice which is to be shared between two mobile devices. We identified two security threats related to this problem, discussed the challenges to design the key generation/sharing mechanism, and proposed a new protocol based on bloom filters that overcomes the two main attacks by the intruder. One is when the attacker places its device in the close vicinity of the location where the user attempts to generate/share the key in order to derive the key from eavesdropping on com
APA, Harvard, Vancouver, ISO, and other styles
7

May, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers." Thesis, Queensland University of Technology, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kasparek, Alexander J. "Secure Key Agreement for Wearable Medical Devices." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1333.

Full text
Abstract:
In this thesis we explore if a proposed random binary sequence generation algorithm can be combined with a separately proposed symmetric key agreement protocol to provide usable security for communications in Wireless Body Area Networks (WBAN). Other previous works in this area fall short by only considering key generation between two of the same signals or allowing for key generation between two different types of signals but with the cost of a significant signal collection time requirement. We hoped to advance this area of research by making secure key generation more efficient with less sig
APA, Harvard, Vancouver, ISO, and other styles
9

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.

Full text
Abstract:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
APA, Harvard, Vancouver, ISO, and other styles
10

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.

Full text
Abstract:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
APA, Harvard, Vancouver, ISO, and other styles
11

Saran, Nurdan A. "Time Memory Trade Off Attack On Symmetric Ciphers." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610437/index.pdf.

Full text
Abstract:
Time Memory Trade O (TMTO) is a cryptanalytic method that aims to develop an attack which has a lower memory complexity than lookup table and a lower online time complexity than exhaustive search. TMTO methods are widely studied in the literature and used for inverting various cryptosystems. We focus on the design and the analysis of TMTO on symmetric ciphers in this thesis. Firstly, the summary of the random mapping statistics from the view point of TMTO is presented. We also recalculate some expected values with a simpler approach than the existing proofs. Then, we propose some variant const
APA, Harvard, Vancouver, ISO, and other styles
12

Lafitte, Frédéric. "On the automated verification of symmetric-key cryptographic algorithms: an approach based on SAT-solvers." Doctoral thesis, Universite Libre de Bruxelles, 2017. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/257908.

Full text
Abstract:
A cryptographic protocol is a structured exchange of messages protected by means of cryptographic algorithms. Computer security in general relies heavily on these protocols and algorithms; in turn, these rely absolutely on smaller components called primitives. As technology advances, computers have reached a cost and a degree of miniaturisation conducive to their proliferation throughout society in the form of software-controlled network-enabled things. As these things find their way into environments where security is critical, their protection ultimately relies on primitives; if a primitive
APA, Harvard, Vancouver, ISO, and other styles
13

Witt, Alexander W. "Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/829.

Full text
Abstract:
A WIoT is a wireless network of low-power sensing nodes placed on the human body. While operating, these networks routinely collect physiological signals to send to offsite medical professionals for review. In this manner, these networks support a concept known as pervasive healthcare in which patients can be continuously monitored and treated remotely. Given that these networks are used to guide medical treatment and depend on transmitting sensitive data, it is important to ensure that the communication channel remains secure. Symmetric pairwise cryptography is a traditional scheme that can b
APA, Harvard, Vancouver, ISO, and other styles
14

Kalibjian, Jeff. "Storage Systems and Security Challenges in Telemetry Post Processing Environments." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606206.

Full text
Abstract:
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California<br>A common concern in telemetry post-processing environments is adequate disk storage capacity to house captured and post-processed telemetry data. In today's network environments there are many storage solutions that can be deployed to address storage needs. Recent trends in storage systems reveal movement to implement security services in storage systems. After reviewing storage
APA, Harvard, Vancouver, ISO, and other styles
15

Brandner, Kay [Verfasser], and Udo [Akademischer Betreuer] Seifert. "Universal bounds on efficiency and power of heat engines with broken time-reversal symmetry / Kay Brandner. Betreuer: Udo Seifert." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2015. http://d-nb.info/1075494036/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

GUPTA, ANANYA. "DECENTRALIZED KEY GENERATION SCHEME FOR CELLULAR-BASED HETEROGENEOUS WIRELESS Ad Hoc NETWORKS." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1153347454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Diene, Adama. "Structure of Permutation Polynomials." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1123788311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Tunaru, Iulia. "Physical layer secret key generation for decentralized wireless networks." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S081/document.

Full text
Abstract:
Dans cette thèse on s’est intéressé aux méthodes de génération de clés secrètes symétriques en utilisant la couche physique ultra large bande impulsionnelle (IR-UWB). Les travaux ont été réalisés selon trois axes, les deux premiers concernant la communication point-à-point et le dernier, les communications coopératives. Tout d’abord, la quantification des signaux typiques IR-UWB (soit directement échantillonnés, soit estimés) a été investiguée, principalement du point de vue du compromis entre la robustesse (ou réciprocité) des séquences binaires obtenues et leur caractère aléatoire. Différent
APA, Harvard, Vancouver, ISO, and other styles
19

He, Bing. "Architecture Design and Performance Optimization of Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1275923221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Noroozi, Hamid. "Alternative Polynomials for Rijndael : Diffusion Analysis." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36304.

Full text
Abstract:
The Rijndael cryptosystem uses a particular polynomial to create its constants. All calculations within the encryption and decryption layers are based on this polynomial. This arouse the curiosity to see what happens if the polynomial is substituted by other polynomials. This paper’s main area of study is to investigate the consequences of using different polynomials to construct the Rijndael cryptosystem. To do so, as a phase of this study, a Mathematica package has been created to ease the investigations. As the second phase, using the aforementioned package, some kind of diffusion analysis
APA, Harvard, Vancouver, ISO, and other styles
21

Lallemand, Virginie. "Cryptanalyse de chiffrements symétriques." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066657/document.

Full text
Abstract:
Les travaux réalisés dans cette thèse ont pour objet l'analyse de la sécurité de chiffrements à clef secrète. Plus précisément, nous y décrivons la cryptanalyse de plusieurs chiffrements par blocs et à flot ayant pour point commun d'avoir été conçus récemment pour répondre aux nouveaux enjeux de la cryptographie symétrique. Nous mettons en avant des attaques des versions complètes de cinq chiffrements, prouvant ainsi que ces primitives cryptographiques n'apportent pas la sécurité annoncée par leurs concepteurs.La première partie de cette thèse est dédiée à l'analyse de chiffrements par blocs a
APA, Harvard, Vancouver, ISO, and other styles
22

Odland, Tove. "On Methods for Solving Symmetric Systems of Linear Equations Arising in Optimization." Doctoral thesis, KTH, Optimeringslära och systemteori, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166675.

Full text
Abstract:
In this thesis we present research on mathematical properties of methods for solv- ing symmetric systems of linear equations that arise in various optimization problem formulations and in methods for solving such problems. In the first and third paper (Paper A and Paper C), we consider the connection be- tween the method of conjugate gradients and quasi-Newton methods on strictly convex quadratic optimization problems or equivalently on a symmetric system of linear equa- tions with a positive definite matrix. We state conditions on the quasi-Newton matrix and the update matrix such that the se
APA, Harvard, Vancouver, ISO, and other styles
23

Marriere, Nicolas. "Cryptanalyse de chiffrements par blocs avec la méthode des variances." Thesis, Cergy-Pontoise, 2017. http://www.theses.fr/2017CERG0922/document.

Full text
Abstract:
La première partie de la thèse porte sur l'utilisation de la méthode des variances dans le cadre des attaques différentielles sur des schémas de Feistel généralisés. Cette méthode permet d'améliorer des attaques sur deux points : la complexité en données ou le nombre de tours couvert par l'attaque.Afin d'atteindre ce but, un outil a été développé permettant de calculer la valeur exacte de l'espérance et de la variance et nous nous servons alors de cette précision pour améliorer les attaques.La seconde partie porte sur une famille de schémas de chiffrement : les EGFN.Nous avons utilisé la métho
APA, Harvard, Vancouver, ISO, and other styles
24

Connolly, Aisling. "Try Again. Fail Again. Fail Better : New notions of security, broken assumptions, and increased efficiency in cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2019. http://www.theses.fr/2019PSLEE034.

Full text
Abstract:
Cette thèse présente des résultats nouveaux portant sur trois domaines fondamentaux de la cryptographie : les propriétés de sécurité, les hypothèses cryptographiques, et l’efficacité algorithmique. La première partie s’intéresse à la sécurité des primitives symétriques. Nous introduisons une nouvelle propriété de sécurité correspondant à la plus forte sécurité pour les primitives symétriques prouvées sûres dans le modèle de l’oracle aléatoire. Les attaques par clé corrélées capturent les scénarios dans lesquels toutes les entrées (clés, messages, et éventuellement nonces et en-têtes) sont corr
APA, Harvard, Vancouver, ISO, and other styles
25

Lallemand, Virginie. "Cryptanalyse de chiffrements symétriques." Electronic Thesis or Diss., Paris 6, 2016. http://www.theses.fr/2016PA066657.

Full text
Abstract:
Les travaux réalisés dans cette thèse ont pour objet l'analyse de la sécurité de chiffrements à clef secrète. Plus précisément, nous y décrivons la cryptanalyse de plusieurs chiffrements par blocs et à flot ayant pour point commun d'avoir été conçus récemment pour répondre aux nouveaux enjeux de la cryptographie symétrique. Nous mettons en avant des attaques des versions complètes de cinq chiffrements, prouvant ainsi que ces primitives cryptographiques n'apportent pas la sécurité annoncée par leurs concepteurs.La première partie de cette thèse est dédiée à l'analyse de chiffrements par blocs a
APA, Harvard, Vancouver, ISO, and other styles
26

Carter, Gary Peter. "The design, analysis and categorization of block ciphers and their components." Thesis, Queensland University of Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Самойлик, Євген Олександрович, та Yevgen Samoylik. "Лексикографічні методи захисту мовної інформації". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44637.

Full text
Abstract:
Дисертаційна робота присвячена створенню стійких симетричних криптосистем, що не пред’являють жорстких вимог до системи розповсюдження ключової інформації. Розроблено метод побудови семантичного словника, який задає семантичну структуру словника прикладної області. Розроблено метод побудови лексикографічної системи захисту мовної інформації, який за рахунок укрупнення алфавіту джерела текстових повідомлень забезпечив збільшення відстані єдиності шифру, що надало змогу суттєво збільшити довжину шифрованих повідомлень відносно довжини ключової інформації. Розроблено метод побудови стійкої крипто
APA, Harvard, Vancouver, ISO, and other styles
28

Portella, Rodrigo. "Balancing energy, security and circuit area in lightweight cryptographic hardware design." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE036/document.

Full text
Abstract:
Cette thèse aborde la conception et les contremesures permettant d'améliorer le calcul cryptographique matériel léger. Parce que la cryptographie (et la cryptanalyse) sont de nos jours de plus en plus omniprésentes dans notre vie quotidienne, il est crucial que les nouveaux systèmes développés soient suffisamment robustes pour faire face à la quantité croissante de données de traitement sans compromettre la sécurité globale. Ce travail aborde de nombreux sujets liés aux implémentations cryptographiques légères. Les principales contributions de cette thèse sont : - Un nouveau système d'accéléra
APA, Harvard, Vancouver, ISO, and other styles
29

Shin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.

Full text
Abstract:
In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive med
APA, Harvard, Vancouver, ISO, and other styles
30

Marček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.

Full text
Abstract:
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discu
APA, Harvard, Vancouver, ISO, and other styles
31

Z'aba, Muhammad Reza. "Analysis of linear relationships in block ciphers." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/35725/1/Muhammad_Z%27aba_Thesis.pdf.

Full text
Abstract:
This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relation
APA, Harvard, Vancouver, ISO, and other styles
32

Boiko, А., V. Shendryk, and L. Cherednichenko. "Verification of Cryptosystems Sustainability as the Main Criterion for Development of Common Information Security Policy." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/55749.

Full text
Abstract:
Security of data resources has become one of the main issues of modern society. Encryption is one of the most reliable ways to protect data from unauthorized disclosure. One of the key factors that influenced the formation of a new approach to information security is a significant growth of distributed-processing systems and use of computer networks for communication between users. It is a key reason to develop an information security policy.
APA, Harvard, Vancouver, ISO, and other styles
33

Coggia, Daniel. "Techniques de cryptanalyse dédiées au chiffrement à bas coût." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS217.

Full text
Abstract:
Cette thèse contribue à l’effort de cryptanalyse de primitives symétriques comme les chiffrements par bloc ou les générateurs pseudo-aléatoires. Elle étudie en particulier une famille de distingueurs fondés sur la propagation de sous-espaces vectoriels différentiels dans les chiffrements par bloc de construction SPN. Cette thèse propose également des méthodes permettant aux cryptographes de modéliser un problème de cryptanalyse de primitive symétrique en problème MILP (Mixed-Integer Linear Programming), afin d’exploiter certains logiciels solutionneurs de problèmes MILP très performants. Enfin
APA, Harvard, Vancouver, ISO, and other styles
34

Kiely, Yagan M. "An exploration of octatonicism: From Liszt to Takemitsu." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2534.

Full text
Abstract:
The octatonic pitch set can be found in the works of many composers since the early nineteenth century, often with different characteristics of the pitch set being exploited by the composers. Much of the literature on octatonicism relates to specific instances in compositions or a specific composer’s approach to it rather than exploring octatonicism from a more holistic perspective. This dissertation serves as a holistic resource for the characteristics of the octatonic pitch set; whether as a scale, especially with regards to common practice harmony; or an unordered set. It does this by consi
APA, Harvard, Vancouver, ISO, and other styles
35

Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.

Full text
Abstract:
Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation.
APA, Harvard, Vancouver, ISO, and other styles
36

Kircanski, Aleksandar. "Cryptanalysis of symmetric key primitives." Thesis, 2009. http://spectrum.library.concordia.ca/976777/1/MR63043.pdf.

Full text
Abstract:
Block ciphers and stream ciphers are essential building blocks that are used to construct computing systems which have to satisfy several security objectives. Since the security of these systems depends on the security of its parts, the analysis of these symmetric key primitives has been a goal of critical importance. In this thesis we provide cryptanalytic results for some recently proposed block and stream ciphers. First, we consider two light-weight block ciphers, TREYFER and PIFEA-M. While TREYFER was designed to be very compact in order to fit into constrained environments such as smart
APA, Harvard, Vancouver, ISO, and other styles
37

Giri, Naresh Kumar. "A dependable and secure approach for secret key establishment and operation in automotive CPS." Thesis, 2018. http://hdl.handle.net/2097/39137.

Full text
Abstract:
Master of Science<br>Department of Computer Science<br>Arslan Munir<br>Modern automobiles incorporate a network of electronic control units (ECUs) that provides a range of features such as safety, driver assistance, infotainment. Such network of ECUs in a vehicle are connected to each other through buses, forming interconnections called intra-vehicle network. Bus technologies that are widely used in modern day automobiles are controller area network (CAN), local interconnect network (LIN), and media oriented systems transport (MOST). These bus technologies, however, do not possess any security
APA, Harvard, Vancouver, ISO, and other styles
38

Esmaeili, Salehani Yaser. "Side Channel Attacks on Symmetric Key Primitives." Thesis, 2011. http://spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani_MASc_F2011.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Shun-WenYeh and 葉舜文. "Blockchain-based Symmetric-key Direct Digital Signature Scheme and Its Application." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/745fqh.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Sayilar, Gokhan. "Cryptoraptor : high throughput reconfigurable cryptographic processor for symmetric key encryption and cryptographic hash functions." Thesis, 2014. http://hdl.handle.net/2152/28267.

Full text
Abstract:
In cryptographic processor design, the selection of functional primitives and connection structures between these primitives are extremely crucial to maximize throughput and flexibility. Hence, detailed analysis on the specifications and requirements of existing crypto-systems plays a crucial role in cryptographic processor design. This thesis provides the most comprehensive literature review that we are aware of on the widest range of existing cryptographic algorithms, their specifications, requirements, and hardware structures. In the light of this analysis, it also describes a high performa
APA, Harvard, Vancouver, ISO, and other styles
41

Ma, X., H. Song, J. Wang, J. Gao, and Geyong Min. "A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks." 2014. http://hdl.handle.net/10454/10728.

Full text
Abstract:
No<br>A two-tiered architecture with resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier is expected to be adopted in large scale sensor networks. In a hostile environment, adversaries are more motivated to compromise the master nodes to break the authenticity and completeness of query results, whereas it is lack of light and secure query processing protocol in tiered sensor networks at present. In this paper, we study the problem of verifiable fine-grained top- queries in two-tiered sensor networks, and propose a novel verification scheme, which is na
APA, Harvard, Vancouver, ISO, and other styles
42

Swaroop, D. "Anonymity With Authenticity." Thesis, 2011. https://etd.iisc.ac.in/handle/2005/2374.

Full text
Abstract:
Cryptography is science of secure message transmission. Cryptanalysis is involved with breaking these encrypted messages. Both cryptography and cryptanalysis constitute together to form cryptology. Anonymity means namelessness i.e., the quality or state of being unknown while authenticity translates to the quality or condition of being authentic or genuine. Anonymity and authenticity are two different embodiments of personal secrecy. Modern power has increased in its capacity to designate individuals, due to which they find it inconvenient to continue communicating, remaining anonymous. In t
APA, Harvard, Vancouver, ISO, and other styles
43

Swaroop, D. "Anonymity With Authenticity." Thesis, 2011. http://etd.iisc.ernet.in/handle/2005/2374.

Full text
Abstract:
Cryptography is science of secure message transmission. Cryptanalysis is involved with breaking these encrypted messages. Both cryptography and cryptanalysis constitute together to form cryptology. Anonymity means namelessness i.e., the quality or state of being unknown while authenticity translates to the quality or condition of being authentic or genuine. Anonymity and authenticity are two different embodiments of personal secrecy. Modern power has increased in its capacity to designate individuals, due to which they find it inconvenient to continue communicating, remaining anonymous. In thi
APA, Harvard, Vancouver, ISO, and other styles
44

Abubaker, Sarshad. "Probabilistic, lightweight cryptosystems based on finite automata." Thesis, 2011. http://hdl.handle.net/1828/3410.

Full text
Abstract:
Most of the cryptosystems currently used are based on number theoretic problems. We focus on cryptosystems based on finite automata (FA) which are lightweight in nature and have relatively small key sizes. The security of these systems relies on the difficulties in inverting non-linear finite automata and factoring matrix polynomials. In symmetric or single key encryption, the secret key consists of two finite automata and their inverses. By applying the inverses of the automata to the cipher text, the plain text can be effectively calculated. In case of asymmetric or public key encryption, t
APA, Harvard, Vancouver, ISO, and other styles
45

Cheng, Yen-hung, and 鄭彥鴻. "One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/23549679550177628322.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>97<br>In recent years, the development of mobile networks is thriving or flourishing from 2G GSM, 2.5G GPRS, 3G UMTS to All-IP 4G, which integrates all heterogeneous networks and becomes mature and popular nowadays. Using mobile devices for voice transferring and multimedia sharing is also a part of our life. Mobile networks provide us an efficient way to exchange messages easily. However, these messages often contain critical personal data or private information. Transferring these messages freely in mobile network is dangerous since they can be eavesdropped easil
APA, Harvard, Vancouver, ISO, and other styles
46

Myhr, Geir Ove [Verfasser]. "Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing / vorgelegt von Geir Ove Myhr." 2010. http://d-nb.info/101141323X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Lin, Chun-Fang, and 林椿芳. "Research and Implementation of E-Voting System with IC Cards and ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37609861755636278972.

Full text
Abstract:
碩士<br>國立高雄師範大學<br>資訊教育研究所<br>96<br>Electors can express the public opinion by electoral voting in the democratic society, and paper-based voting is the most common way in Taiwan. However, if the seal is not clear enough, it may bring some debate on the result; the low efficiency in recording and counting of ballots is another problem. E-voting is widespread in some countries and has excellent effects, so it is worth to learn their experiences. We compare various foreign E-voting systems and analyze the criteria for design and implement an E-voting system with IC card. On the other hand, peop
APA, Harvard, Vancouver, ISO, and other styles
48

Chang, Yuan-Kang, and 張元康. "A C2-Symmetric Chiral Pool Based Flexible Strategy: Concise Synthesis of COTC-Np, (+)-MK7607, (+)-Lycoricidine, (+)-Valienamine, Key Intermediate of (+)-Pancratistatin, and Conduramines A-1 and E." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/s87qbg.

Full text
Abstract:
博士<br>國立中興大學<br>化學系所<br>98<br>英文摘要: Herein, we propose a novel, concise and flexible total synthesis of prominent and pioneer molecules belong to pseudo-carbasugar [COTC-Nap, (+)-MK7607] and aminocyclitol [(+)-Lycoricidine, (+)-Valienamine] families. Aforementioned compounds possess excellent biological activity such as antibiotic, antiviral, and glycosidase inhibitors and so on. Interestingly, all of our synthetic strategies utilized O-isopropylidene protected cyclohexenediol as key intermediate. Diastereoselective facile synthesis of key intermediate achieved from inexpensive L (or) D tarta
APA, Harvard, Vancouver, ISO, and other styles
49

Zaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications." Thesis, 2010. http://hdl.handle.net/10012/5532.

Full text
Abstract:
This thesis is focused on hash families and cover-free families and their application to problems in cryptography. We present new necessary conditions for generalized separating hash families, and provide new explicit constructions. We then consider three cryptographic applications of hash families and cover-free families. We provide a stronger de nition of anonymity in the context of shared symmetric key primitives and give a new scheme with improved anonymity properties. Second, we observe that nding the invalid signatures in a set of digital signatures that fails batch veri cation is a gro
APA, Harvard, Vancouver, ISO, and other styles
50

Lo, Hong-Jay, and 駱宏杰. "A C2-Symmetric Chiral Pool Based Flexible Strategy: Concise Synthesis of (+)-Valienamine, (+)-Valiolamine, 1-epi-(+)-MK7607, 1-epi-(-)-Streptol, (-)-Hygromycin A, Conduramine B-1, C-1, C-4, D-1, F-1, and F-4, and Key Intermediate of (-)-Laminitol." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/kg5n6m.

Full text
Abstract:
博士<br>國立中興大學<br>化學系所<br>100<br>Herein, we propose a facile and flexible synthetic strategy of chemically challenging and biologically important molecules from C2 symmetric inexpensive chiral pools [L (or) D Tartaric acid]. This expeditious total synthesis includes aminocyclitols [(+)-Valienamine & (+)-Valiolamine], pseudo-carbasugars [1-epi-(+)-MK7607, 1-epi-(-)-streptol], Conduramine series and (-)-Hygromycin A. Aforementioned compounds possess excellent biological activity, such as α- glucosidase inhibitors, antibiotics containing broad spectrum of activity such as peptidyl transferase inhib
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!