Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:( ECDSA). Showing records 1 – 17 of 17 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Brno University of Technology

1. Šelinga, Martin. Kryptoměny .

Degree: 2016, Brno University of Technology

 V tejto bakalárskej práci sú rozobraté základné kryptografické prostriedky ktoré okrem iného využívajú aj kryptomeny. V druhej časti je rozbor a detailný popis najrozšírenejších kryptomien.… (more)

Subjects/Keywords: kryptomena; bitcoin; litecoin; hash; digitálny podpis; kryptografia; SHA-2; ECDSA; cryptocurrency; Bitcoin; Litecoin; hash; digital signature; cryptography; SHA-2; ECDSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šelinga, M. (2016). Kryptoměny . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61660

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šelinga, Martin. “Kryptoměny .” 2016. Thesis, Brno University of Technology. Accessed October 16, 2019. http://hdl.handle.net/11012/61660.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šelinga, Martin. “Kryptoměny .” 2016. Web. 16 Oct 2019.

Vancouver:

Šelinga M. Kryptoměny . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/11012/61660.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šelinga M. Kryptoměny . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/61660

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

2. Geyer, Lukáš. Eliptické křivky v kryptografii .

Degree: 2010, Brno University of Technology

 Cílem této práce je popsat roli eliptických křivek v moderních kryptosystémech, vysvětlit matematické základy na kterých je tato problematika založena, jejich výhody a nevýhody a… (more)

Subjects/Keywords: Eliptická křivka; ECDLP; konečné pole; digitální podpis; ECDSA; kryptografie; Elliptic curve; ECDLP; finite field; digital signature; ECDSA; cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Geyer, L. (2010). Eliptické křivky v kryptografii . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/5926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Geyer, Lukáš. “Eliptické křivky v kryptografii .” 2010. Thesis, Brno University of Technology. Accessed October 16, 2019. http://hdl.handle.net/11012/5926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Geyer, Lukáš. “Eliptické křivky v kryptografii .” 2010. Web. 16 Oct 2019.

Vancouver:

Geyer L. Eliptické křivky v kryptografii . [Internet] [Thesis]. Brno University of Technology; 2010. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/11012/5926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Geyer L. Eliptické křivky v kryptografii . [Thesis]. Brno University of Technology; 2010. Available from: http://hdl.handle.net/11012/5926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

3. Rybka, Štěpán. Skupina algoritmů NSA Suite-B Cryptography .

Degree: 2011, Brno University of Technology

 Tato bakalářská práce s názvem Skupina algoritmů NSA Suite B Cryptography se zabývá algoritmy, které obsahuje sada Suite B. Ty slouží k větší ochraně dat… (more)

Subjects/Keywords: kryptografie; protokol; Suite B; algoritmus; ECDH; SHA; ECDSA; AES; cryptography; protocol; Suite B; algorithm; ECDH; SHA; ECDSA; AES

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rybka, . (2011). Skupina algoritmů NSA Suite-B Cryptography . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/5125

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rybka, Štěpán. “Skupina algoritmů NSA Suite-B Cryptography .” 2011. Thesis, Brno University of Technology. Accessed October 16, 2019. http://hdl.handle.net/11012/5125.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rybka, Štěpán. “Skupina algoritmů NSA Suite-B Cryptography .” 2011. Web. 16 Oct 2019.

Vancouver:

Rybka . Skupina algoritmů NSA Suite-B Cryptography . [Internet] [Thesis]. Brno University of Technology; 2011. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/11012/5125.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rybka . Skupina algoritmů NSA Suite-B Cryptography . [Thesis]. Brno University of Technology; 2011. Available from: http://hdl.handle.net/11012/5125

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

4. Gaddam, Shravya. Design and Implementation of PUF Based Protocols for Remote Integrity Verification.

Degree: MS, Electrical and Computer Engineering, 2016, Virginia Tech

 In recent years, there has been a drastic increase in the prevalence of counterfeiting within the electronics supply chain. At the same time, high-end commercial… (more)

Subjects/Keywords: Physical Unclonable Functions; ECDSA; Elliptic Curve Cryptography; Fuzzy Extraction; Strong Extraction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaddam, S. (2016). Design and Implementation of PUF Based Protocols for Remote Integrity Verification. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/71865

Chicago Manual of Style (16th Edition):

Gaddam, Shravya. “Design and Implementation of PUF Based Protocols for Remote Integrity Verification.” 2016. Masters Thesis, Virginia Tech. Accessed October 16, 2019. http://hdl.handle.net/10919/71865.

MLA Handbook (7th Edition):

Gaddam, Shravya. “Design and Implementation of PUF Based Protocols for Remote Integrity Verification.” 2016. Web. 16 Oct 2019.

Vancouver:

Gaddam S. Design and Implementation of PUF Based Protocols for Remote Integrity Verification. [Internet] [Masters thesis]. Virginia Tech; 2016. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10919/71865.

Council of Science Editors:

Gaddam S. Design and Implementation of PUF Based Protocols for Remote Integrity Verification. [Masters Thesis]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/71865

5. Krisell, Martin. Elliptic Curve Digital Signatures in RSA Hardware.

Degree: The Institute of Technology, 2012, Linköping UniversityLinköping University

A digital signature is the electronic counterpart to the hand written signature. It can prove the source and integrity of any digital data, and… (more)

Subjects/Keywords: Cryptography; Digital Signatures; Elliptic Curves; ECC; ECDSA; ECIES; RSA; Kryptering; Digitala signaturer; Elliptiska kurvor; ECC; ECSDA; ECIES; RSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krisell, M. (2012). Elliptic Curve Digital Signatures in RSA Hardware. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81084

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krisell, Martin. “Elliptic Curve Digital Signatures in RSA Hardware.” 2012. Thesis, Linköping UniversityLinköping University. Accessed October 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81084.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krisell, Martin. “Elliptic Curve Digital Signatures in RSA Hardware.” 2012. Web. 16 Oct 2019.

Vancouver:

Krisell M. Elliptic Curve Digital Signatures in RSA Hardware. [Internet] [Thesis]. Linköping UniversityLinköping University; 2012. [cited 2019 Oct 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81084.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krisell M. Elliptic Curve Digital Signatures in RSA Hardware. [Thesis]. Linköping UniversityLinköping University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81084

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

6. Janáč, Richard. Autentizace v inteligentních sítích .

Degree: 2014, Brno University of Technology

 Táto práca sa zaoberá možnosťami autentizácie servisných technikov pre zariadenia siete Smart Grid. Cieľom bolo vybrať najvhodnejší typ autentizácie bezpečnostným tokenom. Preto sme rozobrali základy… (more)

Subjects/Keywords: autentizácia; kryptografia; algoritmus RSA; algoritmus ECDSA; TPM čip; Čipová karta; USB token; PKCS#11; OpenSC Project; SmartCard-HSM; Crypto++; authentication; cryptography; RSA algorithm; ECDSA algorithm; TPM chip; smart card; USB token; PKCS#11; OpenSC Project; SmartCard-HSM; Crypto++

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Janáč, R. (2014). Autentizace v inteligentních sítích . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/31762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Janáč, Richard. “Autentizace v inteligentních sítích .” 2014. Thesis, Brno University of Technology. Accessed October 16, 2019. http://hdl.handle.net/11012/31762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Janáč, Richard. “Autentizace v inteligentních sítích .” 2014. Web. 16 Oct 2019.

Vancouver:

Janáč R. Autentizace v inteligentních sítích . [Internet] [Thesis]. Brno University of Technology; 2014. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/11012/31762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Janáč R. Autentizace v inteligentních sítích . [Thesis]. Brno University of Technology; 2014. Available from: http://hdl.handle.net/11012/31762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

7. Szturc, Jakub. Softwarová podpora výuky kryptosystémů založených na eliptických křivkách .

Degree: 2009, Brno University of Technology

 Diplomová práce se zaměřením na kryptografii založenou na eliptických křivkách se skládá ze čtyř hlavních částí. První část poskytuje přehled o základních kryptografických a matematických… (more)

Subjects/Keywords: Kryptografie; asymetrický; eliptický; křivka; těleso; bod; ECDSA; Cryptography; asymmetrical; elliptic; curve; field; point; ECDSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Szturc, J. (2009). Softwarová podpora výuky kryptosystémů založených na eliptických křivkách . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/10387

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Szturc, Jakub. “Softwarová podpora výuky kryptosystémů založených na eliptických křivkách .” 2009. Thesis, Brno University of Technology. Accessed October 16, 2019. http://hdl.handle.net/11012/10387.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Szturc, Jakub. “Softwarová podpora výuky kryptosystémů založených na eliptických křivkách .” 2009. Web. 16 Oct 2019.

Vancouver:

Szturc J. Softwarová podpora výuky kryptosystémů založených na eliptických křivkách . [Internet] [Thesis]. Brno University of Technology; 2009. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/11012/10387.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Szturc J. Softwarová podpora výuky kryptosystémů založených na eliptických křivkách . [Thesis]. Brno University of Technology; 2009. Available from: http://hdl.handle.net/11012/10387

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

8. Banchi, Hailu. Analysis of the Key Exchange method of SSH using Elliptic Curve Cryptography and a Public Key Infrastructure .

Degree: 2008, Addis Ababa University

 SSH, Secure Shell, is a protocol that allows user to log into another computer, to execute commands in a remote machine, and to move files… (more)

Subjects/Keywords: SSH; PKI; Elliptic Curve Cryptography; ECDH; ECDSA; certificate; certificate path validation; certificate revocation status checking, key exchange handshake, authentication, Authenticated Dictionaries and RSA.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Banchi, H. (2008). Analysis of the Key Exchange method of SSH using Elliptic Curve Cryptography and a Public Key Infrastructure . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/4458

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Banchi, Hailu. “Analysis of the Key Exchange method of SSH using Elliptic Curve Cryptography and a Public Key Infrastructure .” 2008. Thesis, Addis Ababa University. Accessed October 16, 2019. http://etd.aau.edu.et/dspace/handle/123456789/4458.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Banchi, Hailu. “Analysis of the Key Exchange method of SSH using Elliptic Curve Cryptography and a Public Key Infrastructure .” 2008. Web. 16 Oct 2019.

Vancouver:

Banchi H. Analysis of the Key Exchange method of SSH using Elliptic Curve Cryptography and a Public Key Infrastructure . [Internet] [Thesis]. Addis Ababa University; 2008. [cited 2019 Oct 16]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/4458.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Banchi H. Analysis of the Key Exchange method of SSH using Elliptic Curve Cryptography and a Public Key Infrastructure . [Thesis]. Addis Ababa University; 2008. Available from: http://etd.aau.edu.et/dspace/handle/123456789/4458

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Wright State University

9. Kultinov, Kirill. Software Implementations and Applications of Elliptic Curve Cryptography.

Degree: MSin Cyber Security (M.S.C.S.), Computer Science, 2019, Wright State University

 Elliptic Curve Cryptography (ECC) is a public-key cryptography system. Elliptic Curve Cryptography (ECC) can achieve the same level of security as the public-key cryptography system,… (more)

Subjects/Keywords: Computer Science; Information Technology; Elliptic Curve Cryptography; ECC; software implementation of ECC; ECC over finite fields; ECDH; ECDSA; ECC ElGamal; ECC applications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kultinov, K. (2019). Software Implementations and Applications of Elliptic Curve Cryptography. (Masters Thesis). Wright State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514

Chicago Manual of Style (16th Edition):

Kultinov, Kirill. “Software Implementations and Applications of Elliptic Curve Cryptography.” 2019. Masters Thesis, Wright State University. Accessed October 16, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514.

MLA Handbook (7th Edition):

Kultinov, Kirill. “Software Implementations and Applications of Elliptic Curve Cryptography.” 2019. Web. 16 Oct 2019.

Vancouver:

Kultinov K. Software Implementations and Applications of Elliptic Curve Cryptography. [Internet] [Masters thesis]. Wright State University; 2019. [cited 2019 Oct 16]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514.

Council of Science Editors:

Kultinov K. Software Implementations and Applications of Elliptic Curve Cryptography. [Masters Thesis]. Wright State University; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1559232475298514


University of Manitoba

10. Biswas, Subir. Establishing security and privacy in WAVE-enabled vehicular ad hoc networks.

Degree: Computer Science, 2013, University of Manitoba

 Security and privacy are among the growing concerns of a Vehicular Ad hoc Network (VANET) which requires a high degree of liability from its participants.… (more)

Subjects/Keywords: VANET Security; privacy; anonymity; authentication; WAVE; DSRC; proxy signature; ID-based signature; ECDSA; EDCA; OBU; RSU; vehicular communications; contention window; access category; DDoS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Biswas, S. (2013). Establishing security and privacy in WAVE-enabled vehicular ad hoc networks. (Thesis). University of Manitoba. Retrieved from http://hdl.handle.net/1993/14439

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Biswas, Subir. “Establishing security and privacy in WAVE-enabled vehicular ad hoc networks.” 2013. Thesis, University of Manitoba. Accessed October 16, 2019. http://hdl.handle.net/1993/14439.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Biswas, Subir. “Establishing security and privacy in WAVE-enabled vehicular ad hoc networks.” 2013. Web. 16 Oct 2019.

Vancouver:

Biswas S. Establishing security and privacy in WAVE-enabled vehicular ad hoc networks. [Internet] [Thesis]. University of Manitoba; 2013. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/1993/14439.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Biswas S. Establishing security and privacy in WAVE-enabled vehicular ad hoc networks. [Thesis]. University of Manitoba; 2013. Available from: http://hdl.handle.net/1993/14439

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

11. Hauserová, Markéta. Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS .

Degree: 2012, Brno University of Technology

 Práce rozebírá české zákony týkající se zdravotnické dokumentace. Popisuje, jaké body musí splňovat IS, aby zdravotnická dokumentace mohla být vedena jen v elektronické podobě. Shrnuje různé… (more)

Subjects/Keywords: Zdravotnická dokumentace; Bezpečnost; Zaručený elektronický podpis; Asymetrická kryptografie; Hashovací funkce; RSA; DSA; ECDSA; Biometrické systémy; Čipové karty; PDF; Zálohování a archivace; FTPS; Certifikáty; X.509; Health documentation; security; lectronic signature; Asymmetric cryptograph; hash function; RSA. DSA; ECDSA; Biometric systems; Smart cards; PDF; backup  and archiving; FTPS; Certificates; X.509

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hauserová, M. (2012). Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/53588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hauserová, Markéta. “Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS .” 2012. Thesis, Brno University of Technology. Accessed October 16, 2019. http://hdl.handle.net/11012/53588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hauserová, Markéta. “Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS .” 2012. Web. 16 Oct 2019.

Vancouver:

Hauserová M. Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS . [Internet] [Thesis]. Brno University of Technology; 2012. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/11012/53588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hauserová M. Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS . [Thesis]. Brno University of Technology; 2012. Available from: http://hdl.handle.net/11012/53588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

12. Matula, Lukáš. Post-kvantová kryptografie na omezených zařízeních .

Degree: 2019, Brno University of Technology

 V posledních letech dochází k velkému technologickému vývoji, který mimo jiné přináší návrhy a realizace kvantových počítačů. V případě využití kvantových počítačů je dle Shorova… (more)

Subjects/Keywords: Post-kvantová kryptografie; kvantový počítač; AES; RSA; ECDH; ECDSA; DSA; SHA; NTRU; NP-těžký; SVP; CVP; LWE; Ring-LWE; Rainbow; NewHope; Kyber; Frodo; SIKE; McEliece; Picnic; EEPROM; RAM; verifikace; autentizace; omezené zařízení; čipová karta; implementace; šifrování; dešifrování; Post-quantum cryptography; quantum computer; AES; RSA; ECDH; ECDSA; DSA; SHA; NTRU; NP-hard; SVP; CVP; LWE; Ring-LWE; Rainbow; NewHope; Kyber; Frodo; SIKE; McEliece; Picnic; EEPROM; RAM; verification; authentization; constrained device; smart card; implementation; encryption; decryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Matula, L. (2019). Post-kvantová kryptografie na omezených zařízeních . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173583

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Matula, Lukáš. “Post-kvantová kryptografie na omezených zařízeních .” 2019. Thesis, Brno University of Technology. Accessed October 16, 2019. http://hdl.handle.net/11012/173583.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Matula, Lukáš. “Post-kvantová kryptografie na omezených zařízeních .” 2019. Web. 16 Oct 2019.

Vancouver:

Matula L. Post-kvantová kryptografie na omezených zařízeních . [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/11012/173583.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Matula L. Post-kvantová kryptografie na omezených zařízeních . [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173583

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

13. Das, Saptarsi. A Polymorphic Finite Field Multiplier.

Degree: 2011, Indian Institute of Science

 Cryptography algorithms like the Advanced Encryption Standard, Elliptic Curve Cryptography algorithms etc are designed using algebraic properties of finite fields. Thus performance of these algorithms… (more)

Subjects/Keywords: Mobile Communication - Security; Poymorphic Multiplier; Finite Field Arithmetic; Cryptography; Elliptic Curve Cryptography (ECC); Public Key Cryptography Algorithms; Elliptic Curve Diffie-Hellman Algorithm (ECDHA); Elliptic Curve Digital Signature Algorithm (ECDSA); Communication Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Das, S. (2011). A Polymorphic Finite Field Multiplier. (Thesis). Indian Institute of Science. Retrieved from http://hdl.handle.net/2005/2100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Das, Saptarsi. “A Polymorphic Finite Field Multiplier.” 2011. Thesis, Indian Institute of Science. Accessed October 16, 2019. http://hdl.handle.net/2005/2100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Das, Saptarsi. “A Polymorphic Finite Field Multiplier.” 2011. Web. 16 Oct 2019.

Vancouver:

Das S. A Polymorphic Finite Field Multiplier. [Internet] [Thesis]. Indian Institute of Science; 2011. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/2005/2100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Das S. A Polymorphic Finite Field Multiplier. [Thesis]. Indian Institute of Science; 2011. Available from: http://hdl.handle.net/2005/2100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Maire, Steven M. Inverted Edwards Coordinates (Maire Model of an Elliptic Curve).

Degree: MSs, Applied Mathematics, 2014, Case Western Reserve University

 Edwards curves are a fairly new way of expressing a family of elliptic curvesthat contain extremely desirable cryptographic properties over other forms thathave been used.… (more)

Subjects/Keywords: Mathematics; Computer Science; elliptic curves; elliptic curve cryptography; edwards curves; ECDHKE; ECDSA; maire form; elliptic addition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maire, S. M. (2014). Inverted Edwards Coordinates (Maire Model of an Elliptic Curve). (Masters Thesis). Case Western Reserve University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=case1396888557

Chicago Manual of Style (16th Edition):

Maire, Steven M. “Inverted Edwards Coordinates (Maire Model of an Elliptic Curve).” 2014. Masters Thesis, Case Western Reserve University. Accessed October 16, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1396888557.

MLA Handbook (7th Edition):

Maire, Steven M. “Inverted Edwards Coordinates (Maire Model of an Elliptic Curve).” 2014. Web. 16 Oct 2019.

Vancouver:

Maire SM. Inverted Edwards Coordinates (Maire Model of an Elliptic Curve). [Internet] [Masters thesis]. Case Western Reserve University; 2014. [cited 2019 Oct 16]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=case1396888557.

Council of Science Editors:

Maire SM. Inverted Edwards Coordinates (Maire Model of an Elliptic Curve). [Masters Thesis]. Case Western Reserve University; 2014. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=case1396888557


University of Debrecen

15. Papp, János. Kriptovaluta technológiák: egy áttekintés .

Degree: DE – Természettudományi és Technológiai Kar – Matematikai Intézet, University of Debrecen

 Ebben a dolgozatban a kriptovaluta konstrukciók alapját képező technológia elemeit tárgyaljuk. Szó esik többek között az ütközésrezisztens hash függvényekről, a biztonságos digitális aláírás sémákról, illetve… (more)

Subjects/Keywords: Hash; hash függvény; SHA256; digitális aláírási sémák; elliptikus görbe; ECDSA; Merkle-fa; Bitcoin; Tangle; iOta

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Papp, J. (n.d.). Kriptovaluta technológiák: egy áttekintés . (Thesis). University of Debrecen. Retrieved from http://hdl.handle.net/2437/266762

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Papp, János. “Kriptovaluta technológiák: egy áttekintés .” Thesis, University of Debrecen. Accessed October 16, 2019. http://hdl.handle.net/2437/266762.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Papp, János. “Kriptovaluta technológiák: egy áttekintés .” Web. 16 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Papp J. Kriptovaluta technológiák: egy áttekintés . [Internet] [Thesis]. University of Debrecen; [cited 2019 Oct 16]. Available from: http://hdl.handle.net/2437/266762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Papp J. Kriptovaluta technológiák: egy áttekintés . [Thesis]. University of Debrecen; Available from: http://hdl.handle.net/2437/266762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

16. Barzi, Behnaz Kouchaki. Points of High Order on Elliptic Curves : ECDSA.

Degree: Mathematics, 2016, Linnaeus University

  This master thesis is about Elliptic Curve Digital Signature Algorithm or ECDSA and two of the known attacks on this security system. The purpose… (more)

Subjects/Keywords: Digital signature (DS.); Elliptic Curve Digital Signature Algorithm (ECDSA); Elliptic Curve Discrete Logarithm Problem (ECDLP); Baby Step; Giant Step (Bs.Gs.); Pollard’s Rho

…is all about ECDSA and ECDLP with some examples. For the fifth section, we will have a… …quite complete explanation of two types of attacks on ECDSA; Baby Step, Giant Step attack and… …Behnaz Kouchaki Barzi 24 Master Thesis 4 4.1 ECDLP & ECDSA. The Elliptic Curve Discrete… …or ECDSA and in the fifth section we will study two types of attacks on it namely, Baby… …4.2 The Elliptic Curve Digital Signature Algorithm or ECDSA. The Elliptic Curve Digital… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barzi, B. K. (2016). Points of High Order on Elliptic Curves : ECDSA. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-58449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barzi, Behnaz Kouchaki. “Points of High Order on Elliptic Curves : ECDSA.” 2016. Thesis, Linnaeus University. Accessed October 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-58449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barzi, Behnaz Kouchaki. “Points of High Order on Elliptic Curves : ECDSA.” 2016. Web. 16 Oct 2019.

Vancouver:

Barzi BK. Points of High Order on Elliptic Curves : ECDSA. [Internet] [Thesis]. Linnaeus University; 2016. [cited 2019 Oct 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-58449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barzi BK. Points of High Order on Elliptic Curves : ECDSA. [Thesis]. Linnaeus University; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-58449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

17. Hitchcock, Yvonne Roslyn. Elliptic curve cryptography for lightweight applications.

Degree: 2003, Queensland University of Technology

 Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty… (more)

Subjects/Keywords: Elliptic curve (EC); elliptic curve cryptosystem (ECC); discrete logarithm problem (DLP); elliptic curve discrete logarithm problem (ECDLP); speed; code size; memory usage; ram usage; fixed curve; random curve; elliptic curve digital signature algorithm (ECDSA); Pollard's rho method; Shanks's baby-step giant-step method (BSGS); Canetti-Krawczyk proof model; key exchange protocols; security proof; tripartite key exchange; pairings; password-based authentication; point addition; projective coordinates; Jacobian coordinates; Chudnovsky Jacobian coordinates; modified Jacobian coordinates; binary method; simultaneous multiple exponentiation; two-in-one scalar multiplication; coprocessor; smart card; lightweight device; simple power analysis (spa); side channel attack; equivalent security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hitchcock, Y. R. (2003). Elliptic curve cryptography for lightweight applications. (Thesis). Queensland University of Technology. Retrieved from http://eprints.qut.edu.au/15838/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hitchcock, Yvonne Roslyn. “Elliptic curve cryptography for lightweight applications.” 2003. Thesis, Queensland University of Technology. Accessed October 16, 2019. http://eprints.qut.edu.au/15838/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hitchcock, Yvonne Roslyn. “Elliptic curve cryptography for lightweight applications.” 2003. Web. 16 Oct 2019.

Vancouver:

Hitchcock YR. Elliptic curve cryptography for lightweight applications. [Internet] [Thesis]. Queensland University of Technology; 2003. [cited 2019 Oct 16]. Available from: http://eprints.qut.edu.au/15838/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hitchcock YR. Elliptic curve cryptography for lightweight applications. [Thesis]. Queensland University of Technology; 2003. Available from: http://eprints.qut.edu.au/15838/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.