Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Symmetry key.

Rozprawy doktorskie na temat „Symmetry key”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Symmetry key”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Reyes, Elisabeth. "Evolutionary history of floral key innovations in angiosperms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS489/document.

Pełny tekst źródła
Streszczenie:
Les Angiospermes forment un clade connu pour sa grande diversité d’espèces et une répartition inégale de cette diversité en son sein. Ce travail se concentre sur la reconstruction d’états ancestraux de caractères floraux sur les phylogénies dans le but d’étudier leur impact sur la diversification. En premier lieu, nous nous sommes focalisés sur deux innovations-clés potentielles chez les Proteaceae, la symétrie bilatérale du périanthe et la présence dans les hotspots à climat méditerranéen. L’utilisation sur une phylogénie de modèles de diversification dépendants des états de caractère a permi
Style APA, Harvard, Vancouver, ISO itp.
2

Azam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.

Pełny tekst źródła
Streszczenie:
In recent times the usage of smart phones has significantly increased. Businesses are transforming to make more out of smart phones. As a consequence, there is an increasing demand to have more and more mobile applications. Among other areas, mobile applications are also being used to make financial transactions. Applications used for financial transactions need to be more reliable and have end-to-end security. To implement security we heavily depend on cryptography and the heart of cryptography is the keys which are used in cryptographic processes (encryption/decryption). Therefore, it is ess
Style APA, Harvard, Vancouver, ISO itp.
3

Talluri, Sai Raghu. "Towards Designing Energy Efficient Symmetric Key Protocols." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/853.

Pełny tekst źródła
Streszczenie:
Energy consumption by various modern symmetric key encryption protocols (DES, 3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work is directed towards redesigning or modifying the underlying algorithms for these protocols to make them consume less energy than they currently do. This research takes the approach of reducing energy consumption by parallelizing the consecutive memory accesses of symmetric key encryption algorithms. To achieve parallelization, an existing energy complexity model is applied to symmetric key encryption algorithms. Inspired by the popular DDR
Style APA, Harvard, Vancouver, ISO itp.
4

Čanda, Valér. "Scalable symmetric block ciphers based on group bases." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ghosh, Debeshi D. "Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10263604.

Pełny tekst źródła
Streszczenie:
<p> Watermarking is the process of embedding information into a carrier signal such as audio, video, and images. It is widely used to protect proprietary information in the signal to prevent information theft or duplicity. In this project, an audio watermarking system with dual layer security has been implemented. The entire system is divided into two sections that are independent, but have been combined, to make a unique system that provides increased levels of robustness. The first part of the project involves encrypting an embedded image (watermark) using the XOR method of symmetric key cry
Style APA, Harvard, Vancouver, ISO itp.
6

Kamineni, Surya Bharat. "Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6874.

Pełny tekst źródła
Streszczenie:
In this thesis, we present results of an experimental study in order to generate a secure cryptographic key from the user’s voice which is to be shared between two mobile devices. We identified two security threats related to this problem, discussed the challenges to design the key generation/sharing mechanism, and proposed a new protocol based on bloom filters that overcomes the two main attacks by the intruder. One is when the attacker places its device in the close vicinity of the location where the user attempts to generate/share the key in order to derive the key from eavesdropping on com
Style APA, Harvard, Vancouver, ISO itp.
7

May, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers." Thesis, Queensland University of Technology, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kasparek, Alexander J. "Secure Key Agreement for Wearable Medical Devices." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1333.

Pełny tekst źródła
Streszczenie:
In this thesis we explore if a proposed random binary sequence generation algorithm can be combined with a separately proposed symmetric key agreement protocol to provide usable security for communications in Wireless Body Area Networks (WBAN). Other previous works in this area fall short by only considering key generation between two of the same signals or allowing for key generation between two different types of signals but with the cost of a significant signal collection time requirement. We hoped to advance this area of research by making secure key generation more efficient with less sig
Style APA, Harvard, Vancouver, ISO itp.
9

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
Style APA, Harvard, Vancouver, ISO itp.
10

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.

Pełny tekst źródła
Streszczenie:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
Style APA, Harvard, Vancouver, ISO itp.
11

Saran, Nurdan A. "Time Memory Trade Off Attack On Symmetric Ciphers." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610437/index.pdf.

Pełny tekst źródła
Streszczenie:
Time Memory Trade O (TMTO) is a cryptanalytic method that aims to develop an attack which has a lower memory complexity than lookup table and a lower online time complexity than exhaustive search. TMTO methods are widely studied in the literature and used for inverting various cryptosystems. We focus on the design and the analysis of TMTO on symmetric ciphers in this thesis. Firstly, the summary of the random mapping statistics from the view point of TMTO is presented. We also recalculate some expected values with a simpler approach than the existing proofs. Then, we propose some variant const
Style APA, Harvard, Vancouver, ISO itp.
12

Lafitte, Frédéric. "On the automated verification of symmetric-key cryptographic algorithms: an approach based on SAT-solvers." Doctoral thesis, Universite Libre de Bruxelles, 2017. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/257908.

Pełny tekst źródła
Streszczenie:
A cryptographic protocol is a structured exchange of messages protected by means of cryptographic algorithms. Computer security in general relies heavily on these protocols and algorithms; in turn, these rely absolutely on smaller components called primitives. As technology advances, computers have reached a cost and a degree of miniaturisation conducive to their proliferation throughout society in the form of software-controlled network-enabled things. As these things find their way into environments where security is critical, their protection ultimately relies on primitives; if a primitive
Style APA, Harvard, Vancouver, ISO itp.
13

Witt, Alexander W. "Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/829.

Pełny tekst źródła
Streszczenie:
A WIoT is a wireless network of low-power sensing nodes placed on the human body. While operating, these networks routinely collect physiological signals to send to offsite medical professionals for review. In this manner, these networks support a concept known as pervasive healthcare in which patients can be continuously monitored and treated remotely. Given that these networks are used to guide medical treatment and depend on transmitting sensitive data, it is important to ensure that the communication channel remains secure. Symmetric pairwise cryptography is a traditional scheme that can b
Style APA, Harvard, Vancouver, ISO itp.
14

Kalibjian, Jeff. "Storage Systems and Security Challenges in Telemetry Post Processing Environments." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606206.

Pełny tekst źródła
Streszczenie:
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California<br>A common concern in telemetry post-processing environments is adequate disk storage capacity to house captured and post-processed telemetry data. In today's network environments there are many storage solutions that can be deployed to address storage needs. Recent trends in storage systems reveal movement to implement security services in storage systems. After reviewing storage
Style APA, Harvard, Vancouver, ISO itp.
15

Brandner, Kay [Verfasser], and Udo [Akademischer Betreuer] Seifert. "Universal bounds on efficiency and power of heat engines with broken time-reversal symmetry / Kay Brandner. Betreuer: Udo Seifert." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2015. http://d-nb.info/1075494036/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

GUPTA, ANANYA. "DECENTRALIZED KEY GENERATION SCHEME FOR CELLULAR-BASED HETEROGENEOUS WIRELESS Ad Hoc NETWORKS." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1153347454.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Diene, Adama. "Structure of Permutation Polynomials." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1123788311.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Tunaru, Iulia. "Physical layer secret key generation for decentralized wireless networks." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S081/document.

Pełny tekst źródła
Streszczenie:
Dans cette thèse on s’est intéressé aux méthodes de génération de clés secrètes symétriques en utilisant la couche physique ultra large bande impulsionnelle (IR-UWB). Les travaux ont été réalisés selon trois axes, les deux premiers concernant la communication point-à-point et le dernier, les communications coopératives. Tout d’abord, la quantification des signaux typiques IR-UWB (soit directement échantillonnés, soit estimés) a été investiguée, principalement du point de vue du compromis entre la robustesse (ou réciprocité) des séquences binaires obtenues et leur caractère aléatoire. Différent
Style APA, Harvard, Vancouver, ISO itp.
19

He, Bing. "Architecture Design and Performance Optimization of Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1275923221.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Noroozi, Hamid. "Alternative Polynomials for Rijndael : Diffusion Analysis." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36304.

Pełny tekst źródła
Streszczenie:
The Rijndael cryptosystem uses a particular polynomial to create its constants. All calculations within the encryption and decryption layers are based on this polynomial. This arouse the curiosity to see what happens if the polynomial is substituted by other polynomials. This paper’s main area of study is to investigate the consequences of using different polynomials to construct the Rijndael cryptosystem. To do so, as a phase of this study, a Mathematica package has been created to ease the investigations. As the second phase, using the aforementioned package, some kind of diffusion analysis
Style APA, Harvard, Vancouver, ISO itp.
21

Lallemand, Virginie. "Cryptanalyse de chiffrements symétriques." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066657/document.

Pełny tekst źródła
Streszczenie:
Les travaux réalisés dans cette thèse ont pour objet l'analyse de la sécurité de chiffrements à clef secrète. Plus précisément, nous y décrivons la cryptanalyse de plusieurs chiffrements par blocs et à flot ayant pour point commun d'avoir été conçus récemment pour répondre aux nouveaux enjeux de la cryptographie symétrique. Nous mettons en avant des attaques des versions complètes de cinq chiffrements, prouvant ainsi que ces primitives cryptographiques n'apportent pas la sécurité annoncée par leurs concepteurs.La première partie de cette thèse est dédiée à l'analyse de chiffrements par blocs a
Style APA, Harvard, Vancouver, ISO itp.
22

Odland, Tove. "On Methods for Solving Symmetric Systems of Linear Equations Arising in Optimization." Doctoral thesis, KTH, Optimeringslära och systemteori, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166675.

Pełny tekst źródła
Streszczenie:
In this thesis we present research on mathematical properties of methods for solv- ing symmetric systems of linear equations that arise in various optimization problem formulations and in methods for solving such problems. In the first and third paper (Paper A and Paper C), we consider the connection be- tween the method of conjugate gradients and quasi-Newton methods on strictly convex quadratic optimization problems or equivalently on a symmetric system of linear equa- tions with a positive definite matrix. We state conditions on the quasi-Newton matrix and the update matrix such that the se
Style APA, Harvard, Vancouver, ISO itp.
23

Marriere, Nicolas. "Cryptanalyse de chiffrements par blocs avec la méthode des variances." Thesis, Cergy-Pontoise, 2017. http://www.theses.fr/2017CERG0922/document.

Pełny tekst źródła
Streszczenie:
La première partie de la thèse porte sur l'utilisation de la méthode des variances dans le cadre des attaques différentielles sur des schémas de Feistel généralisés. Cette méthode permet d'améliorer des attaques sur deux points : la complexité en données ou le nombre de tours couvert par l'attaque.Afin d'atteindre ce but, un outil a été développé permettant de calculer la valeur exacte de l'espérance et de la variance et nous nous servons alors de cette précision pour améliorer les attaques.La seconde partie porte sur une famille de schémas de chiffrement : les EGFN.Nous avons utilisé la métho
Style APA, Harvard, Vancouver, ISO itp.
24

Connolly, Aisling. "Try Again. Fail Again. Fail Better : New notions of security, broken assumptions, and increased efficiency in cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2019. http://www.theses.fr/2019PSLEE034.

Pełny tekst źródła
Streszczenie:
Cette thèse présente des résultats nouveaux portant sur trois domaines fondamentaux de la cryptographie : les propriétés de sécurité, les hypothèses cryptographiques, et l’efficacité algorithmique. La première partie s’intéresse à la sécurité des primitives symétriques. Nous introduisons une nouvelle propriété de sécurité correspondant à la plus forte sécurité pour les primitives symétriques prouvées sûres dans le modèle de l’oracle aléatoire. Les attaques par clé corrélées capturent les scénarios dans lesquels toutes les entrées (clés, messages, et éventuellement nonces et en-têtes) sont corr
Style APA, Harvard, Vancouver, ISO itp.
25

Lallemand, Virginie. "Cryptanalyse de chiffrements symétriques." Electronic Thesis or Diss., Paris 6, 2016. http://www.theses.fr/2016PA066657.

Pełny tekst źródła
Streszczenie:
Les travaux réalisés dans cette thèse ont pour objet l'analyse de la sécurité de chiffrements à clef secrète. Plus précisément, nous y décrivons la cryptanalyse de plusieurs chiffrements par blocs et à flot ayant pour point commun d'avoir été conçus récemment pour répondre aux nouveaux enjeux de la cryptographie symétrique. Nous mettons en avant des attaques des versions complètes de cinq chiffrements, prouvant ainsi que ces primitives cryptographiques n'apportent pas la sécurité annoncée par leurs concepteurs.La première partie de cette thèse est dédiée à l'analyse de chiffrements par blocs a
Style APA, Harvard, Vancouver, ISO itp.
26

Carter, Gary Peter. "The design, analysis and categorization of block ciphers and their components." Thesis, Queensland University of Technology, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Самойлик, Євген Олександрович, та Yevgen Samoylik. "Лексикографічні методи захисту мовної інформації". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44637.

Pełny tekst źródła
Streszczenie:
Дисертаційна робота присвячена створенню стійких симетричних криптосистем, що не пред’являють жорстких вимог до системи розповсюдження ключової інформації. Розроблено метод побудови семантичного словника, який задає семантичну структуру словника прикладної області. Розроблено метод побудови лексикографічної системи захисту мовної інформації, який за рахунок укрупнення алфавіту джерела текстових повідомлень забезпечив збільшення відстані єдиності шифру, що надало змогу суттєво збільшити довжину шифрованих повідомлень відносно довжини ключової інформації. Розроблено метод побудови стійкої крипто
Style APA, Harvard, Vancouver, ISO itp.
28

Portella, Rodrigo. "Balancing energy, security and circuit area in lightweight cryptographic hardware design." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE036/document.

Pełny tekst źródła
Streszczenie:
Cette thèse aborde la conception et les contremesures permettant d'améliorer le calcul cryptographique matériel léger. Parce que la cryptographie (et la cryptanalyse) sont de nos jours de plus en plus omniprésentes dans notre vie quotidienne, il est crucial que les nouveaux systèmes développés soient suffisamment robustes pour faire face à la quantité croissante de données de traitement sans compromettre la sécurité globale. Ce travail aborde de nombreux sujets liés aux implémentations cryptographiques légères. Les principales contributions de cette thèse sont : - Un nouveau système d'accéléra
Style APA, Harvard, Vancouver, ISO itp.
29

Shin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive med
Style APA, Harvard, Vancouver, ISO itp.
30

Marček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.

Pełny tekst źródła
Streszczenie:
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discu
Style APA, Harvard, Vancouver, ISO itp.
31

Z'aba, Muhammad Reza. "Analysis of linear relationships in block ciphers." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/35725/1/Muhammad_Z%27aba_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relation
Style APA, Harvard, Vancouver, ISO itp.
32

Boiko, А., V. Shendryk, and L. Cherednichenko. "Verification of Cryptosystems Sustainability as the Main Criterion for Development of Common Information Security Policy." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/55749.

Pełny tekst źródła
Streszczenie:
Security of data resources has become one of the main issues of modern society. Encryption is one of the most reliable ways to protect data from unauthorized disclosure. One of the key factors that influenced the formation of a new approach to information security is a significant growth of distributed-processing systems and use of computer networks for communication between users. It is a key reason to develop an information security policy.
Style APA, Harvard, Vancouver, ISO itp.
33

Coggia, Daniel. "Techniques de cryptanalyse dédiées au chiffrement à bas coût." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS217.

Pełny tekst źródła
Streszczenie:
Cette thèse contribue à l’effort de cryptanalyse de primitives symétriques comme les chiffrements par bloc ou les générateurs pseudo-aléatoires. Elle étudie en particulier une famille de distingueurs fondés sur la propagation de sous-espaces vectoriels différentiels dans les chiffrements par bloc de construction SPN. Cette thèse propose également des méthodes permettant aux cryptographes de modéliser un problème de cryptanalyse de primitive symétrique en problème MILP (Mixed-Integer Linear Programming), afin d’exploiter certains logiciels solutionneurs de problèmes MILP très performants. Enfin
Style APA, Harvard, Vancouver, ISO itp.
34

Kiely, Yagan M. "An exploration of octatonicism: From Liszt to Takemitsu." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2534.

Pełny tekst źródła
Streszczenie:
The octatonic pitch set can be found in the works of many composers since the early nineteenth century, often with different characteristics of the pitch set being exploited by the composers. Much of the literature on octatonicism relates to specific instances in compositions or a specific composer’s approach to it rather than exploring octatonicism from a more holistic perspective. This dissertation serves as a holistic resource for the characteristics of the octatonic pitch set; whether as a scale, especially with regards to common practice harmony; or an unordered set. It does this by consi
Style APA, Harvard, Vancouver, ISO itp.
35

Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.

Pełny tekst źródła
Streszczenie:
Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation.
Style APA, Harvard, Vancouver, ISO itp.
36

Kircanski, Aleksandar. "Cryptanalysis of symmetric key primitives." Thesis, 2009. http://spectrum.library.concordia.ca/976777/1/MR63043.pdf.

Pełny tekst źródła
Streszczenie:
Block ciphers and stream ciphers are essential building blocks that are used to construct computing systems which have to satisfy several security objectives. Since the security of these systems depends on the security of its parts, the analysis of these symmetric key primitives has been a goal of critical importance. In this thesis we provide cryptanalytic results for some recently proposed block and stream ciphers. First, we consider two light-weight block ciphers, TREYFER and PIFEA-M. While TREYFER was designed to be very compact in order to fit into constrained environments such as smart
Style APA, Harvard, Vancouver, ISO itp.
37

Giri, Naresh Kumar. "A dependable and secure approach for secret key establishment and operation in automotive CPS." Thesis, 2018. http://hdl.handle.net/2097/39137.

Pełny tekst źródła
Streszczenie:
Master of Science<br>Department of Computer Science<br>Arslan Munir<br>Modern automobiles incorporate a network of electronic control units (ECUs) that provides a range of features such as safety, driver assistance, infotainment. Such network of ECUs in a vehicle are connected to each other through buses, forming interconnections called intra-vehicle network. Bus technologies that are widely used in modern day automobiles are controller area network (CAN), local interconnect network (LIN), and media oriented systems transport (MOST). These bus technologies, however, do not possess any security
Style APA, Harvard, Vancouver, ISO itp.
38

Esmaeili, Salehani Yaser. "Side Channel Attacks on Symmetric Key Primitives." Thesis, 2011. http://spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani_MASc_F2011.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Shun-WenYeh and 葉舜文. "Blockchain-based Symmetric-key Direct Digital Signature Scheme and Its Application." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/745fqh.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Sayilar, Gokhan. "Cryptoraptor : high throughput reconfigurable cryptographic processor for symmetric key encryption and cryptographic hash functions." Thesis, 2014. http://hdl.handle.net/2152/28267.

Pełny tekst źródła
Streszczenie:
In cryptographic processor design, the selection of functional primitives and connection structures between these primitives are extremely crucial to maximize throughput and flexibility. Hence, detailed analysis on the specifications and requirements of existing crypto-systems plays a crucial role in cryptographic processor design. This thesis provides the most comprehensive literature review that we are aware of on the widest range of existing cryptographic algorithms, their specifications, requirements, and hardware structures. In the light of this analysis, it also describes a high performa
Style APA, Harvard, Vancouver, ISO itp.
41

Ma, X., H. Song, J. Wang, J. Gao, and Geyong Min. "A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks." 2014. http://hdl.handle.net/10454/10728.

Pełny tekst źródła
Streszczenie:
No<br>A two-tiered architecture with resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier is expected to be adopted in large scale sensor networks. In a hostile environment, adversaries are more motivated to compromise the master nodes to break the authenticity and completeness of query results, whereas it is lack of light and secure query processing protocol in tiered sensor networks at present. In this paper, we study the problem of verifiable fine-grained top- queries in two-tiered sensor networks, and propose a novel verification scheme, which is na
Style APA, Harvard, Vancouver, ISO itp.
42

Swaroop, D. "Anonymity With Authenticity." Thesis, 2011. https://etd.iisc.ac.in/handle/2005/2374.

Pełny tekst źródła
Streszczenie:
Cryptography is science of secure message transmission. Cryptanalysis is involved with breaking these encrypted messages. Both cryptography and cryptanalysis constitute together to form cryptology. Anonymity means namelessness i.e., the quality or state of being unknown while authenticity translates to the quality or condition of being authentic or genuine. Anonymity and authenticity are two different embodiments of personal secrecy. Modern power has increased in its capacity to designate individuals, due to which they find it inconvenient to continue communicating, remaining anonymous. In t
Style APA, Harvard, Vancouver, ISO itp.
43

Swaroop, D. "Anonymity With Authenticity." Thesis, 2011. http://etd.iisc.ernet.in/handle/2005/2374.

Pełny tekst źródła
Streszczenie:
Cryptography is science of secure message transmission. Cryptanalysis is involved with breaking these encrypted messages. Both cryptography and cryptanalysis constitute together to form cryptology. Anonymity means namelessness i.e., the quality or state of being unknown while authenticity translates to the quality or condition of being authentic or genuine. Anonymity and authenticity are two different embodiments of personal secrecy. Modern power has increased in its capacity to designate individuals, due to which they find it inconvenient to continue communicating, remaining anonymous. In thi
Style APA, Harvard, Vancouver, ISO itp.
44

Abubaker, Sarshad. "Probabilistic, lightweight cryptosystems based on finite automata." Thesis, 2011. http://hdl.handle.net/1828/3410.

Pełny tekst źródła
Streszczenie:
Most of the cryptosystems currently used are based on number theoretic problems. We focus on cryptosystems based on finite automata (FA) which are lightweight in nature and have relatively small key sizes. The security of these systems relies on the difficulties in inverting non-linear finite automata and factoring matrix polynomials. In symmetric or single key encryption, the secret key consists of two finite automata and their inverses. By applying the inverses of the automata to the cipher text, the plain text can be effectively calculated. In case of asymmetric or public key encryption, t
Style APA, Harvard, Vancouver, ISO itp.
45

Cheng, Yen-hung, and 鄭彥鴻. "One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/23549679550177628322.

Pełny tekst źródła
Streszczenie:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>97<br>In recent years, the development of mobile networks is thriving or flourishing from 2G GSM, 2.5G GPRS, 3G UMTS to All-IP 4G, which integrates all heterogeneous networks and becomes mature and popular nowadays. Using mobile devices for voice transferring and multimedia sharing is also a part of our life. Mobile networks provide us an efficient way to exchange messages easily. However, these messages often contain critical personal data or private information. Transferring these messages freely in mobile network is dangerous since they can be eavesdropped easil
Style APA, Harvard, Vancouver, ISO itp.
46

Myhr, Geir Ove [Verfasser]. "Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing / vorgelegt von Geir Ove Myhr." 2010. http://d-nb.info/101141323X/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Lin, Chun-Fang, and 林椿芳. "Research and Implementation of E-Voting System with IC Cards and ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37609861755636278972.

Pełny tekst źródła
Streszczenie:
碩士<br>國立高雄師範大學<br>資訊教育研究所<br>96<br>Electors can express the public opinion by electoral voting in the democratic society, and paper-based voting is the most common way in Taiwan. However, if the seal is not clear enough, it may bring some debate on the result; the low efficiency in recording and counting of ballots is another problem. E-voting is widespread in some countries and has excellent effects, so it is worth to learn their experiences. We compare various foreign E-voting systems and analyze the criteria for design and implement an E-voting system with IC card. On the other hand, peop
Style APA, Harvard, Vancouver, ISO itp.
48

Chang, Yuan-Kang, and 張元康. "A C2-Symmetric Chiral Pool Based Flexible Strategy: Concise Synthesis of COTC-Np, (+)-MK7607, (+)-Lycoricidine, (+)-Valienamine, Key Intermediate of (+)-Pancratistatin, and Conduramines A-1 and E." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/s87qbg.

Pełny tekst źródła
Streszczenie:
博士<br>國立中興大學<br>化學系所<br>98<br>英文摘要: Herein, we propose a novel, concise and flexible total synthesis of prominent and pioneer molecules belong to pseudo-carbasugar [COTC-Nap, (+)-MK7607] and aminocyclitol [(+)-Lycoricidine, (+)-Valienamine] families. Aforementioned compounds possess excellent biological activity such as antibiotic, antiviral, and glycosidase inhibitors and so on. Interestingly, all of our synthetic strategies utilized O-isopropylidene protected cyclohexenediol as key intermediate. Diastereoselective facile synthesis of key intermediate achieved from inexpensive L (or) D tarta
Style APA, Harvard, Vancouver, ISO itp.
49

Zaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications." Thesis, 2010. http://hdl.handle.net/10012/5532.

Pełny tekst źródła
Streszczenie:
This thesis is focused on hash families and cover-free families and their application to problems in cryptography. We present new necessary conditions for generalized separating hash families, and provide new explicit constructions. We then consider three cryptographic applications of hash families and cover-free families. We provide a stronger de nition of anonymity in the context of shared symmetric key primitives and give a new scheme with improved anonymity properties. Second, we observe that nding the invalid signatures in a set of digital signatures that fails batch veri cation is a gro
Style APA, Harvard, Vancouver, ISO itp.
50

Lo, Hong-Jay, and 駱宏杰. "A C2-Symmetric Chiral Pool Based Flexible Strategy: Concise Synthesis of (+)-Valienamine, (+)-Valiolamine, 1-epi-(+)-MK7607, 1-epi-(-)-Streptol, (-)-Hygromycin A, Conduramine B-1, C-1, C-4, D-1, F-1, and F-4, and Key Intermediate of (-)-Laminitol." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/kg5n6m.

Pełny tekst źródła
Streszczenie:
博士<br>國立中興大學<br>化學系所<br>100<br>Herein, we propose a facile and flexible synthetic strategy of chemically challenging and biologically important molecules from C2 symmetric inexpensive chiral pools [L (or) D Tartaric acid]. This expeditious total synthesis includes aminocyclitols [(+)-Valienamine & (+)-Valiolamine], pseudo-carbasugars [1-epi-(+)-MK7607, 1-epi-(-)-streptol], Conduramine series and (-)-Hygromycin A. Aforementioned compounds possess excellent biological activity, such as α- glucosidase inhibitors, antibiotics containing broad spectrum of activity such as peptidyl transferase inhib
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!