Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Encryption). Showing records 1 – 30 of 783 total matches.

[1] [2] [3] [4] [5] … [27]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Illinois – Chicago

1. Al-Masalha, Fadi J. Fast Encryption Techniques for Multimedia Contents.

Degree: 2012, University of Illinois – Chicago

 The evolution of wireless handsets from simple mobile phones to smart devices, capable of capturing multimedia information and accessing Internet, has enabled its users to… (more)

Subjects/Keywords: Selective Encryption; Scalable Encryption; VLC Encryption; Fast Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Masalha, F. J. (2012). Fast Encryption Techniques for Multimedia Contents. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/8132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al-Masalha, Fadi J. “Fast Encryption Techniques for Multimedia Contents.” 2012. Thesis, University of Illinois – Chicago. Accessed May 20, 2019. http://hdl.handle.net/10027/8132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al-Masalha, Fadi J. “Fast Encryption Techniques for Multimedia Contents.” 2012. Web. 20 May 2019.

Vancouver:

Al-Masalha FJ. Fast Encryption Techniques for Multimedia Contents. [Internet] [Thesis]. University of Illinois – Chicago; 2012. [cited 2019 May 20]. Available from: http://hdl.handle.net/10027/8132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al-Masalha FJ. Fast Encryption Techniques for Multimedia Contents. [Thesis]. University of Illinois – Chicago; 2012. Available from: http://hdl.handle.net/10027/8132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

2. Sun, Dongdong. Predicate encryption with various properties.

Degree: 2012, Queensland University of Technology

 Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with… (more)

Subjects/Keywords: predicate encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, D. (2012). Predicate encryption with various properties. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/60301/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sun, Dongdong. “Predicate encryption with various properties.” 2012. Thesis, Queensland University of Technology. Accessed May 20, 2019. https://eprints.qut.edu.au/60301/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sun, Dongdong. “Predicate encryption with various properties.” 2012. Web. 20 May 2019.

Vancouver:

Sun D. Predicate encryption with various properties. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2019 May 20]. Available from: https://eprints.qut.edu.au/60301/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sun D. Predicate encryption with various properties. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/60301/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ottawa

3. Pabstel, Melanie Anne. Parameter Constraints on Homomorphic Encryption Over the Integers .

Degree: 2017, University of Ottawa

 The research paper Fully Homomorphic Encryption over the Integers by van Dijk, Gentry, Halevi, and Vaikuntanathan [31] explores the construction of an encryption scheme over… (more)

Subjects/Keywords: homomorphic; encryption; cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pabstel, M. A. (2017). Parameter Constraints on Homomorphic Encryption Over the Integers . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/35977

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pabstel, Melanie Anne. “Parameter Constraints on Homomorphic Encryption Over the Integers .” 2017. Thesis, University of Ottawa. Accessed May 20, 2019. http://hdl.handle.net/10393/35977.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pabstel, Melanie Anne. “Parameter Constraints on Homomorphic Encryption Over the Integers .” 2017. Web. 20 May 2019.

Vancouver:

Pabstel MA. Parameter Constraints on Homomorphic Encryption Over the Integers . [Internet] [Thesis]. University of Ottawa; 2017. [cited 2019 May 20]. Available from: http://hdl.handle.net/10393/35977.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pabstel MA. Parameter Constraints on Homomorphic Encryption Over the Integers . [Thesis]. University of Ottawa; 2017. Available from: http://hdl.handle.net/10393/35977

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

4. Snook, Michael. Integer-based fully homomorphic encryption.

Degree: School of Mathematical Sciences (COS), 2011, Rochester Institute of Technology

  The concept of fully homomorphic encryption has been considered the "holy grail" of cryptography since the discovery of secure public key cryptography in the… (more)

Subjects/Keywords: Cryptography; Encryption; Homomorphic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Snook, M. (2011). Integer-based fully homomorphic encryption. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/7018

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Snook, Michael. “Integer-based fully homomorphic encryption.” 2011. Thesis, Rochester Institute of Technology. Accessed May 20, 2019. https://scholarworks.rit.edu/theses/7018.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Snook, Michael. “Integer-based fully homomorphic encryption.” 2011. Web. 20 May 2019.

Vancouver:

Snook M. Integer-based fully homomorphic encryption. [Internet] [Thesis]. Rochester Institute of Technology; 2011. [cited 2019 May 20]. Available from: https://scholarworks.rit.edu/theses/7018.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Snook M. Integer-based fully homomorphic encryption. [Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/7018

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Tsai, Chen-yu. Applications of Homomorphic Encryption.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 First, we prove that if an asymmetric homomorphic encryption (homomorphic on addoperation) which can detect zero, detect equality, compare the value or detect overflow without… (more)

Subjects/Keywords: IND-CPA; detect zero; symmetric encryption scheme; asymmetric encryption; homomorphic encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, C. (2013). Applications of Homomorphic Encryption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Chen-yu. “Applications of Homomorphic Encryption.” 2013. Thesis, NSYSU. Accessed May 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Chen-yu. “Applications of Homomorphic Encryption.” 2013. Web. 20 May 2019.

Vancouver:

Tsai C. Applications of Homomorphic Encryption. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 May 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai C. Applications of Homomorphic Encryption. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Halmstad University

6. Nguyen, Robin. The cloud, a security risk? : A study on cloud computing and efficient encryption.

Degree: Information Technology, 2018, Halmstad University

  After many incidents of cloud services being attacked and personal user data leaking, a secure way of storing data on the cloud would be… (more)

Subjects/Keywords: Encryption; AES; Xor; Cloud encryption; Encryption speed; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, R. (2018). The cloud, a security risk? : A study on cloud computing and efficient encryption. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37988

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nguyen, Robin. “The cloud, a security risk? : A study on cloud computing and efficient encryption.” 2018. Thesis, Halmstad University. Accessed May 20, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37988.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nguyen, Robin. “The cloud, a security risk? : A study on cloud computing and efficient encryption.” 2018. Web. 20 May 2019.

Vancouver:

Nguyen R. The cloud, a security risk? : A study on cloud computing and efficient encryption. [Internet] [Thesis]. Halmstad University; 2018. [cited 2019 May 20]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37988.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nguyen R. The cloud, a security risk? : A study on cloud computing and efficient encryption. [Thesis]. Halmstad University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37988

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

7. Naveed, Muhammad. Secure and practical computation on encrypted data.

Degree: PhD, Computer Science, 2016, University of Illinois – Urbana-Champaign

 Because of the importance of computing on data with privacy protections, the cryptographic community has developed both theoretical and practical solutions to compute on encrypted… (more)

Subjects/Keywords: computation on encrypted data; property-preserving encryption; symmetric searchable encryption; controlled functional encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naveed, M. (2016). Secure and practical computation on encrypted data. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/90606

Chicago Manual of Style (16th Edition):

Naveed, Muhammad. “Secure and practical computation on encrypted data.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed May 20, 2019. http://hdl.handle.net/2142/90606.

MLA Handbook (7th Edition):

Naveed, Muhammad. “Secure and practical computation on encrypted data.” 2016. Web. 20 May 2019.

Vancouver:

Naveed M. Secure and practical computation on encrypted data. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2019 May 20]. Available from: http://hdl.handle.net/2142/90606.

Council of Science Editors:

Naveed M. Secure and practical computation on encrypted data. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/90606


Indian Institute of Science

8. Yekkala, Anil Kumar. Analysis And Design Of Image And Video Encryption Algorithms.

Degree: 2006, Indian Institute of Science

 The rapid growth in multimedia based Internet systems and applications like video telephony, video on demand, network based DVD recorders and IP television has created… (more)

Subjects/Keywords: Encryption Algorithms; Multimedia Encryption; Multimedia Security; Lightweight Encryption; Cryptanalysis; Image Compression; Image And Video Encryption; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yekkala, A. K. (2006). Analysis And Design Of Image And Video Encryption Algorithms. (Thesis). Indian Institute of Science. Retrieved from http://hdl.handle.net/2005/436

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yekkala, Anil Kumar. “Analysis And Design Of Image And Video Encryption Algorithms.” 2006. Thesis, Indian Institute of Science. Accessed May 20, 2019. http://hdl.handle.net/2005/436.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yekkala, Anil Kumar. “Analysis And Design Of Image And Video Encryption Algorithms.” 2006. Web. 20 May 2019.

Vancouver:

Yekkala AK. Analysis And Design Of Image And Video Encryption Algorithms. [Internet] [Thesis]. Indian Institute of Science; 2006. [cited 2019 May 20]. Available from: http://hdl.handle.net/2005/436.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yekkala AK. Analysis And Design Of Image And Video Encryption Algorithms. [Thesis]. Indian Institute of Science; 2006. Available from: http://hdl.handle.net/2005/436

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

9. Garcia, Ricardo Rodriguez. Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt.

Degree: 2013, University of Ontario Institute of Technology

 The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In… (more)

Subjects/Keywords: Security; Usability; Software; Tool; Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garcia, R. R. (2013). Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/307

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garcia, Ricardo Rodriguez. “Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt.” 2013. Thesis, University of Ontario Institute of Technology. Accessed May 20, 2019. http://hdl.handle.net/10155/307.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garcia, Ricardo Rodriguez. “Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt.” 2013. Web. 20 May 2019.

Vancouver:

Garcia RR. Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt. [Internet] [Thesis]. University of Ontario Institute of Technology; 2013. [cited 2019 May 20]. Available from: http://hdl.handle.net/10155/307.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garcia RR. Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt. [Thesis]. University of Ontario Institute of Technology; 2013. Available from: http://hdl.handle.net/10155/307

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

10. Kamaraj, Abinaya. Efficient Implementation and Power Estimation of Substitute-Box in Advanced Encryption Standard.

Degree: MS, Engineering and Applied Science: Electrical Engineering, 2016, University of Cincinnati

 Increasing numbers of people are using the latest compact, convenient and portable medical equipment and new wireless health care technologies. The new portable devices are… (more)

Subjects/Keywords: Electrical Engineering; AES; Encryption; Power

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kamaraj, A. (2016). Efficient Implementation and Power Estimation of Substitute-Box in Advanced Encryption Standard. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1464077332

Chicago Manual of Style (16th Edition):

Kamaraj, Abinaya. “Efficient Implementation and Power Estimation of Substitute-Box in Advanced Encryption Standard.” 2016. Masters Thesis, University of Cincinnati. Accessed May 20, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1464077332.

MLA Handbook (7th Edition):

Kamaraj, Abinaya. “Efficient Implementation and Power Estimation of Substitute-Box in Advanced Encryption Standard.” 2016. Web. 20 May 2019.

Vancouver:

Kamaraj A. Efficient Implementation and Power Estimation of Substitute-Box in Advanced Encryption Standard. [Internet] [Masters thesis]. University of Cincinnati; 2016. [cited 2019 May 20]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1464077332.

Council of Science Editors:

Kamaraj A. Efficient Implementation and Power Estimation of Substitute-Box in Advanced Encryption Standard. [Masters Thesis]. University of Cincinnati; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1464077332


California State University – Sacramento

11. Anumakonda, Ashwin. Secure defense information system.

Degree: MS, Computer Science, 2011, California State University – Sacramento

 The Defense Information provides expert analysis on various areas like National security, International security and Defense policy. This Information promotes wide-range of discussions and debate… (more)

Subjects/Keywords: RSA; Encryption; Internet security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anumakonda, A. (2011). Secure defense information system. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1142

Chicago Manual of Style (16th Edition):

Anumakonda, Ashwin. “Secure defense information system.” 2011. Masters Thesis, California State University – Sacramento. Accessed May 20, 2019. http://hdl.handle.net/10211.9/1142.

MLA Handbook (7th Edition):

Anumakonda, Ashwin. “Secure defense information system.” 2011. Web. 20 May 2019.

Vancouver:

Anumakonda A. Secure defense information system. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2019 May 20]. Available from: http://hdl.handle.net/10211.9/1142.

Council of Science Editors:

Anumakonda A. Secure defense information system. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/1142


University of Debrecen

12. Meric, Musa. RSA Encrytion in Cryptology .

Degree: DE – Informatikai Kar, University of Debrecen

My thesis is about RSA which is an asymmetric encryption that is critical part of cryptology.It includes calculation and process of RSA encrytion with prime numbers.There exist basic examples with pyhton language that shows encrytion process. Advisors/Committee Members: Fazekas, Gábor (advisor).

Subjects/Keywords: Encryption; cryptology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meric, M. (n.d.). RSA Encrytion in Cryptology . (Thesis). University of Debrecen. Retrieved from http://hdl.handle.net/2437/239163

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Meric, Musa. “RSA Encrytion in Cryptology .” Thesis, University of Debrecen. Accessed May 20, 2019. http://hdl.handle.net/2437/239163.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Meric, Musa. “RSA Encrytion in Cryptology .” Web. 20 May 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Meric M. RSA Encrytion in Cryptology . [Internet] [Thesis]. University of Debrecen; [cited 2019 May 20]. Available from: http://hdl.handle.net/2437/239163.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Meric M. RSA Encrytion in Cryptology . [Thesis]. University of Debrecen; Available from: http://hdl.handle.net/2437/239163

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Oregon State University

13. Basa, Gungor. Image Based Crypto.

Degree: MS, Computer Science, 2016, Oregon State University

 The ability to create reproducible cryptographically secure keys from temporal environments (e.g., images) has the potential to be a contributor to effective cryptographic mechanisms. Due… (more)

Subjects/Keywords: Image; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basa, G. (2016). Image Based Crypto. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/60039

Chicago Manual of Style (16th Edition):

Basa, Gungor. “Image Based Crypto.” 2016. Masters Thesis, Oregon State University. Accessed May 20, 2019. http://hdl.handle.net/1957/60039.

MLA Handbook (7th Edition):

Basa, Gungor. “Image Based Crypto.” 2016. Web. 20 May 2019.

Vancouver:

Basa G. Image Based Crypto. [Internet] [Masters thesis]. Oregon State University; 2016. [cited 2019 May 20]. Available from: http://hdl.handle.net/1957/60039.

Council of Science Editors:

Basa G. Image Based Crypto. [Masters Thesis]. Oregon State University; 2016. Available from: http://hdl.handle.net/1957/60039


Université Montpellier II

14. Islam, Naveed. Cryptography based Visual Data Protection : Protection de données visuelles par chiffrement.

Degree: Docteur es, Informatique, 2011, Université Montpellier II

La transmission de données multimédia sur les réseaux sécurisés a une croissance exponentielle grâce aux progrès scientifique dans les technologies de l'information et de la… (more)

Subjects/Keywords: Chiffrement; Symmetric encryption; Asymmetric encryption; Aes; Rsa; Paillier; Cryptography; Symmetric encryption; Asymmetric encryption; Aes; Rsa; Paillier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Islam, N. (2011). Cryptography based Visual Data Protection : Protection de données visuelles par chiffrement. (Doctoral Dissertation). Université Montpellier II. Retrieved from http://www.theses.fr/2011MON20178

Chicago Manual of Style (16th Edition):

Islam, Naveed. “Cryptography based Visual Data Protection : Protection de données visuelles par chiffrement.” 2011. Doctoral Dissertation, Université Montpellier II. Accessed May 20, 2019. http://www.theses.fr/2011MON20178.

MLA Handbook (7th Edition):

Islam, Naveed. “Cryptography based Visual Data Protection : Protection de données visuelles par chiffrement.” 2011. Web. 20 May 2019.

Vancouver:

Islam N. Cryptography based Visual Data Protection : Protection de données visuelles par chiffrement. [Internet] [Doctoral dissertation]. Université Montpellier II; 2011. [cited 2019 May 20]. Available from: http://www.theses.fr/2011MON20178.

Council of Science Editors:

Islam N. Cryptography based Visual Data Protection : Protection de données visuelles par chiffrement. [Doctoral Dissertation]. Université Montpellier II; 2011. Available from: http://www.theses.fr/2011MON20178


Boise State University

15. Lee, Fiona Yan. An End-to-End Identity-Based Email Encryption Scheme.

Degree: 2014, Boise State University

 Email has evolved into one of the most important methods of communication for any individual and organization. However, current industry standards do not place emphasis… (more)

Subjects/Keywords: end-to-end encryption; id-based encryption; email security; email encryption; encryption key-agreemen; key-agreement protocol; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, F. Y. (2014). An End-to-End Identity-Based Email Encryption Scheme. (Thesis). Boise State University. Retrieved from https://scholarworks.boisestate.edu/td/880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lee, Fiona Yan. “An End-to-End Identity-Based Email Encryption Scheme.” 2014. Thesis, Boise State University. Accessed May 20, 2019. https://scholarworks.boisestate.edu/td/880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lee, Fiona Yan. “An End-to-End Identity-Based Email Encryption Scheme.” 2014. Web. 20 May 2019.

Vancouver:

Lee FY. An End-to-End Identity-Based Email Encryption Scheme. [Internet] [Thesis]. Boise State University; 2014. [cited 2019 May 20]. Available from: https://scholarworks.boisestate.edu/td/880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lee FY. An End-to-End Identity-Based Email Encryption Scheme. [Thesis]. Boise State University; 2014. Available from: https://scholarworks.boisestate.edu/td/880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Nuttapong, Attrapadung. Unified Frameworks for Practical Broadcast Encryption and Public Key Encryption with High Functionalities : 放送型暗号と高機能公開鍵暗号方式のための統合的枠組みに関する研究.

Degree: 博士(情報理工学), 2017, The University of Tokyo / 東京大学

 In this thesis, we study encryption schemes with various “high functionalities” including one specific focus on broadcast encryption. As for the main contributions, we propose… (more)

Subjects/Keywords: Cryptography; Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nuttapong, A. (2017). Unified Frameworks for Practical Broadcast Encryption and Public Key Encryption with High Functionalities : 放送型暗号と高機能公開鍵暗号方式のための統合的枠組みに関する研究. (Thesis). The University of Tokyo / 東京大学. Retrieved from http://hdl.handle.net/2261/25864

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nuttapong, Attrapadung. “Unified Frameworks for Practical Broadcast Encryption and Public Key Encryption with High Functionalities : 放送型暗号と高機能公開鍵暗号方式のための統合的枠組みに関する研究.” 2017. Thesis, The University of Tokyo / 東京大学. Accessed May 20, 2019. http://hdl.handle.net/2261/25864.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nuttapong, Attrapadung. “Unified Frameworks for Practical Broadcast Encryption and Public Key Encryption with High Functionalities : 放送型暗号と高機能公開鍵暗号方式のための統合的枠組みに関する研究.” 2017. Web. 20 May 2019.

Vancouver:

Nuttapong A. Unified Frameworks for Practical Broadcast Encryption and Public Key Encryption with High Functionalities : 放送型暗号と高機能公開鍵暗号方式のための統合的枠組みに関する研究. [Internet] [Thesis]. The University of Tokyo / 東京大学; 2017. [cited 2019 May 20]. Available from: http://hdl.handle.net/2261/25864.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nuttapong A. Unified Frameworks for Practical Broadcast Encryption and Public Key Encryption with High Functionalities : 放送型暗号と高機能公開鍵暗号方式のための統合的枠組みに関する研究. [Thesis]. The University of Tokyo / 東京大学; 2017. Available from: http://hdl.handle.net/2261/25864

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

17. Tawakol, Abdel Maguid. Using Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases.

Degree: 2016, University of Waterloo

 The Internet has become an essential tool for communication and information access, and with growing demand, new challenges and usage continue to surface. A complimentary… (more)

Subjects/Keywords: encryption; privacy; shamir; databases

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tawakol, A. M. (2016). Using Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10777

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tawakol, Abdel Maguid. “Using Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases.” 2016. Thesis, University of Waterloo. Accessed May 20, 2019. http://hdl.handle.net/10012/10777.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tawakol, Abdel Maguid. “Using Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases.” 2016. Web. 20 May 2019.

Vancouver:

Tawakol AM. Using Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2019 May 20]. Available from: http://hdl.handle.net/10012/10777.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tawakol AM. Using Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/10777

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

18. Zawia, Ahmed. An RNS variant of fully homomorphic encryption over integers.

Degree: 2017, University of Waterloo

 In 1978, the concept of privacy homomorphism was introduced by Rivest et al. Since then, homomorphic cryptosystems have gathered researchers' attention. Most of the early… (more)

Subjects/Keywords: Homomorphic encryption; Residue number system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zawia, A. (2017). An RNS variant of fully homomorphic encryption over integers. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/11833

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zawia, Ahmed. “An RNS variant of fully homomorphic encryption over integers.” 2017. Thesis, University of Waterloo. Accessed May 20, 2019. http://hdl.handle.net/10012/11833.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zawia, Ahmed. “An RNS variant of fully homomorphic encryption over integers.” 2017. Web. 20 May 2019.

Vancouver:

Zawia A. An RNS variant of fully homomorphic encryption over integers. [Internet] [Thesis]. University of Waterloo; 2017. [cited 2019 May 20]. Available from: http://hdl.handle.net/10012/11833.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zawia A. An RNS variant of fully homomorphic encryption over integers. [Thesis]. University of Waterloo; 2017. Available from: http://hdl.handle.net/10012/11833

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

19. Andersson, Martin. Parametric Prediction Model for Perceived Voice Quality in Secure VoIP.

Degree: Information Coding, 2016, Linköping University

  More and more sensitive information is communicated digitally and with thatcomes the demand for security and privacy on the services being used. An accurateQoS… (more)

Subjects/Keywords: VoIP; QoS; Parametric model; Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andersson, M. (2016). Parametric Prediction Model for Perceived Voice Quality in Secure VoIP. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-127402

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andersson, Martin. “Parametric Prediction Model for Perceived Voice Quality in Secure VoIP.” 2016. Thesis, Linköping University. Accessed May 20, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-127402.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andersson, Martin. “Parametric Prediction Model for Perceived Voice Quality in Secure VoIP.” 2016. Web. 20 May 2019.

Vancouver:

Andersson M. Parametric Prediction Model for Perceived Voice Quality in Secure VoIP. [Internet] [Thesis]. Linköping University; 2016. [cited 2019 May 20]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-127402.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andersson M. Parametric Prediction Model for Perceived Voice Quality in Secure VoIP. [Thesis]. Linköping University; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-127402

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Melbourne

20. Ramchen, Kim. Efficient mixnets with application to electronic voting.

Degree: 2013, University of Melbourne

 Cryptographic mixnets are a fundamental tool in the construction of secure electronic elections. Traditional mixnets rely upon third party mixers to perform vote anonymisation at… (more)

Subjects/Keywords: mixnets; homomorphic encryption; electronic voting

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramchen, K. (2013). Efficient mixnets with application to electronic voting. (Masters Thesis). University of Melbourne. Retrieved from http://hdl.handle.net/11343/37796

Chicago Manual of Style (16th Edition):

Ramchen, Kim. “Efficient mixnets with application to electronic voting.” 2013. Masters Thesis, University of Melbourne. Accessed May 20, 2019. http://hdl.handle.net/11343/37796.

MLA Handbook (7th Edition):

Ramchen, Kim. “Efficient mixnets with application to electronic voting.” 2013. Web. 20 May 2019.

Vancouver:

Ramchen K. Efficient mixnets with application to electronic voting. [Internet] [Masters thesis]. University of Melbourne; 2013. [cited 2019 May 20]. Available from: http://hdl.handle.net/11343/37796.

Council of Science Editors:

Ramchen K. Efficient mixnets with application to electronic voting. [Masters Thesis]. University of Melbourne; 2013. Available from: http://hdl.handle.net/11343/37796


Leiden University

21. Chalmers, Ross. The Politics Of Cryptography: How Has Cryptography Transformed Power Relations Between Citizens And The State Through Privacy & Finance?.

Degree: 2018, Leiden University

 This research examines the role of Cryptography in altering the power relations between the State and its citizens in relation to both privacy and economics.… (more)

Subjects/Keywords: Cryptography; Encryption; Bitcoin; Crypto Anarchy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chalmers, R. (2018). The Politics Of Cryptography: How Has Cryptography Transformed Power Relations Between Citizens And The State Through Privacy & Finance?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/65157

Chicago Manual of Style (16th Edition):

Chalmers, Ross. “The Politics Of Cryptography: How Has Cryptography Transformed Power Relations Between Citizens And The State Through Privacy & Finance?.” 2018. Masters Thesis, Leiden University. Accessed May 20, 2019. http://hdl.handle.net/1887/65157.

MLA Handbook (7th Edition):

Chalmers, Ross. “The Politics Of Cryptography: How Has Cryptography Transformed Power Relations Between Citizens And The State Through Privacy & Finance?.” 2018. Web. 20 May 2019.

Vancouver:

Chalmers R. The Politics Of Cryptography: How Has Cryptography Transformed Power Relations Between Citizens And The State Through Privacy & Finance?. [Internet] [Masters thesis]. Leiden University; 2018. [cited 2019 May 20]. Available from: http://hdl.handle.net/1887/65157.

Council of Science Editors:

Chalmers R. The Politics Of Cryptography: How Has Cryptography Transformed Power Relations Between Citizens And The State Through Privacy & Finance?. [Masters Thesis]. Leiden University; 2018. Available from: http://hdl.handle.net/1887/65157


University of Texas – Austin

22. Sachdeva, Kapil. Cloud computing : security risk analysis and recommendations: Security risk analysis and recommendations.

Degree: Engineering Management, 2011, University of Texas – Austin

 Cloud computing is here to stay and is the natural progression in the evolution of our computing and collaboration needs. The easy availability of computing… (more)

Subjects/Keywords: Cloud computing; Security; Risks; Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sachdeva, K. (2011). Cloud computing : security risk analysis and recommendations: Security risk analysis and recommendations. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-12-4592

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sachdeva, Kapil. “Cloud computing : security risk analysis and recommendations: Security risk analysis and recommendations.” 2011. Thesis, University of Texas – Austin. Accessed May 20, 2019. http://hdl.handle.net/2152/ETD-UT-2011-12-4592.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sachdeva, Kapil. “Cloud computing : security risk analysis and recommendations: Security risk analysis and recommendations.” 2011. Web. 20 May 2019.

Vancouver:

Sachdeva K. Cloud computing : security risk analysis and recommendations: Security risk analysis and recommendations. [Internet] [Thesis]. University of Texas – Austin; 2011. [cited 2019 May 20]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-12-4592.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sachdeva K. Cloud computing : security risk analysis and recommendations: Security risk analysis and recommendations. [Thesis]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-12-4592

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

23. Tinker, Cody W. Exploring the Application of Homomorphic Encryption for a Cross Domain Solution.

Degree: MS, Computer Engineering, 2018, Rochester Institute of Technology

  A cross domain solution is a means of information assurance that provides the ability to access or transfer digital data between varying security domains.… (more)

Subjects/Keywords: Cross domain solution; Homomorphic encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tinker, C. W. (2018). Exploring the Application of Homomorphic Encryption for a Cross Domain Solution. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9855

Chicago Manual of Style (16th Edition):

Tinker, Cody W. “Exploring the Application of Homomorphic Encryption for a Cross Domain Solution.” 2018. Masters Thesis, Rochester Institute of Technology. Accessed May 20, 2019. https://scholarworks.rit.edu/theses/9855.

MLA Handbook (7th Edition):

Tinker, Cody W. “Exploring the Application of Homomorphic Encryption for a Cross Domain Solution.” 2018. Web. 20 May 2019.

Vancouver:

Tinker CW. Exploring the Application of Homomorphic Encryption for a Cross Domain Solution. [Internet] [Masters thesis]. Rochester Institute of Technology; 2018. [cited 2019 May 20]. Available from: https://scholarworks.rit.edu/theses/9855.

Council of Science Editors:

Tinker CW. Exploring the Application of Homomorphic Encryption for a Cross Domain Solution. [Masters Thesis]. Rochester Institute of Technology; 2018. Available from: https://scholarworks.rit.edu/theses/9855


Rochester Institute of Technology

24. Bobrov, Maksim. Cryptographic algorithm acceleration using CUDA enabled GPUs in typical system configurations.

Degree: Computer Engineering, 2010, Rochester Institute of Technology

 The need to encrypt data is becoming more and more necessary. As the size of datasets continues to grow, the speed of encryption must increase… (more)

Subjects/Keywords: Cryptography; Cuda; Encryption; Gpu; Hashing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bobrov, M. (2010). Cryptographic algorithm acceleration using CUDA enabled GPUs in typical system configurations. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/3199

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bobrov, Maksim. “Cryptographic algorithm acceleration using CUDA enabled GPUs in typical system configurations.” 2010. Thesis, Rochester Institute of Technology. Accessed May 20, 2019. https://scholarworks.rit.edu/theses/3199.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bobrov, Maksim. “Cryptographic algorithm acceleration using CUDA enabled GPUs in typical system configurations.” 2010. Web. 20 May 2019.

Vancouver:

Bobrov M. Cryptographic algorithm acceleration using CUDA enabled GPUs in typical system configurations. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2019 May 20]. Available from: https://scholarworks.rit.edu/theses/3199.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bobrov M. Cryptographic algorithm acceleration using CUDA enabled GPUs in typical system configurations. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/3199

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

25. Sanfilippo, Michael. Extremely low overhead off-chip memory encryption.

Degree: Computer Engineering, 2011, Rochester Institute of Technology

 Over the last decade, advancements in performance and efficiency of portable computing devices have allowed them to provide much of the functionality previously restricted to… (more)

Subjects/Keywords: AES; Encryption; Real-time

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sanfilippo, M. (2011). Extremely low overhead off-chip memory encryption. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/3204

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sanfilippo, Michael. “Extremely low overhead off-chip memory encryption.” 2011. Thesis, Rochester Institute of Technology. Accessed May 20, 2019. https://scholarworks.rit.edu/theses/3204.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sanfilippo, Michael. “Extremely low overhead off-chip memory encryption.” 2011. Web. 20 May 2019.

Vancouver:

Sanfilippo M. Extremely low overhead off-chip memory encryption. [Internet] [Thesis]. Rochester Institute of Technology; 2011. [cited 2019 May 20]. Available from: https://scholarworks.rit.edu/theses/3204.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sanfilippo M. Extremely low overhead off-chip memory encryption. [Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/3204

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Gilbert, Sawyer Perham. AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION.

Degree: 2017, American University

The purpose of this research is to understand the basic principles of public key encryption from a mathematically perspective and identify security flaws in basic… (more)

Subjects/Keywords: ElGamal; Encryption; Public Key; RSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gilbert, S. P. (2017). AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION. (Masters Thesis). American University. Retrieved from http://hdl.handle.net/1961/auislandora:68654

Chicago Manual of Style (16th Edition):

Gilbert, Sawyer Perham. “AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION.” 2017. Masters Thesis, American University. Accessed May 20, 2019. http://hdl.handle.net/1961/auislandora:68654.

MLA Handbook (7th Edition):

Gilbert, Sawyer Perham. “AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION.” 2017. Web. 20 May 2019.

Vancouver:

Gilbert SP. AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION. [Internet] [Masters thesis]. American University; 2017. [cited 2019 May 20]. Available from: http://hdl.handle.net/1961/auislandora:68654.

Council of Science Editors:

Gilbert SP. AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION. [Masters Thesis]. American University; 2017. Available from: http://hdl.handle.net/1961/auislandora:68654


Royal Holloway, University of London

27. Quaglia, Elizabeth. Anonymity and time in public-key encryption.

Degree: 2012, Royal Holloway, University of London

 In a world that is increasingly relying on digital technologies, the ability to securely communicate and distribute information is of crucial importance. Cryptography plays a… (more)

Subjects/Keywords: 652.8; Cryptography : Public-key encryption : Anonymity : Robustness : Broadcast encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Quaglia, E. (2012). Anonymity and time in public-key encryption. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580630

Chicago Manual of Style (16th Edition):

Quaglia, Elizabeth. “Anonymity and time in public-key encryption.” 2012. Doctoral Dissertation, Royal Holloway, University of London. Accessed May 20, 2019. http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580630.

MLA Handbook (7th Edition):

Quaglia, Elizabeth. “Anonymity and time in public-key encryption.” 2012. Web. 20 May 2019.

Vancouver:

Quaglia E. Anonymity and time in public-key encryption. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2012. [cited 2019 May 20]. Available from: http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580630.

Council of Science Editors:

Quaglia E. Anonymity and time in public-key encryption. [Doctoral Dissertation]. Royal Holloway, University of London; 2012. Available from: http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580630


California State University – Sacramento

28. Azad, Vinit. Fast AES decryption.

Degree: MS, Computer Science, 2011, California State University – Sacramento

 Due to the prevalent use of internet-enabled devices, confidentiality and privacy in communication has been more important than ever. Encryption algorithms, such as AES and… (more)

Subjects/Keywords: Encryption; Bitslicing; Cache-timing attack; Advanced encryption standard

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Azad, V. (2011). Fast AES decryption. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1224

Chicago Manual of Style (16th Edition):

Azad, Vinit. “Fast AES decryption.” 2011. Masters Thesis, California State University – Sacramento. Accessed May 20, 2019. http://hdl.handle.net/10211.9/1224.

MLA Handbook (7th Edition):

Azad, Vinit. “Fast AES decryption.” 2011. Web. 20 May 2019.

Vancouver:

Azad V. Fast AES decryption. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2019 May 20]. Available from: http://hdl.handle.net/10211.9/1224.

Council of Science Editors:

Azad V. Fast AES decryption. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/1224


NSYSU

29. Tseng, Yi-Fan. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a massage securely and efficiently as the message is… (more)

Subjects/Keywords: Multi-Receiver Encryption; Anonymity; Identity-Based Encryption; Bilinear Pairing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, Y. (2014). Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Thesis, NSYSU. Accessed May 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Web. 20 May 2019.

Vancouver:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 May 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

30. Clift, Pamela. Hardware implementation of Offset Codebook Mode3 (OCB3).

Degree: MS, Computer Science, 2014, California State University – Sacramento

Encryption of data has become a necessary practice in our technological society. Encryption tries to ensure protection of important information, corporate secrets, classified information, and… (more)

Subjects/Keywords: Encryption; Authenticated encryption

…12 ix LIST OF FIGURES Figures Page Figure 1 Definition of OCB3 Encryption… …34 x 1 Chapter 1 INTRODUCTION In the digital world, encryption technology is one of the… …encryption issues that require a diverse set of solutions, authenticated encryption can prevent… …authentication. 2 Authenticated encryption uses block ciphers such as the Advanced Encryption… …Software Performance of Authenticated-Encryption Modes” (12). An authenticated… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Clift, P. (2014). Hardware implementation of Offset Codebook Mode3 (OCB3). (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.3/131468

Chicago Manual of Style (16th Edition):

Clift, Pamela. “Hardware implementation of Offset Codebook Mode3 (OCB3).” 2014. Masters Thesis, California State University – Sacramento. Accessed May 20, 2019. http://hdl.handle.net/10211.3/131468.

MLA Handbook (7th Edition):

Clift, Pamela. “Hardware implementation of Offset Codebook Mode3 (OCB3).” 2014. Web. 20 May 2019.

Vancouver:

Clift P. Hardware implementation of Offset Codebook Mode3 (OCB3). [Internet] [Masters thesis]. California State University – Sacramento; 2014. [cited 2019 May 20]. Available from: http://hdl.handle.net/10211.3/131468.

Council of Science Editors:

Clift P. Hardware implementation of Offset Codebook Mode3 (OCB3). [Masters Thesis]. California State University – Sacramento; 2014. Available from: http://hdl.handle.net/10211.3/131468

[1] [2] [3] [4] [5] … [27]

.