Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Kryptografie). Showing records 1 – 30 of 137 total matches.

[1] [2] [3] [4] [5]

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Brno University of Technology

1. Mikulka, Jiří. Knihovna algoritmů pro šifrování textu: Library of Algorithms for Text Ciphering.

Degree: 2019, Brno University of Technology

 This thesis brings an overview of historical and modern methods and approaches used in cryptography. It also describes and assesses ciphers, which have been used… (more)

Subjects/Keywords: kryptografie; kryptoanalýza; bezpečnost; šifrování; šifra; klasická kryptografie; moderní kryptografie; knihovna; cryptography; cryptoanalysis; security; encryption; cipher; classical cryptography; modern cryptography; library

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mikulka, J. (2019). Knihovna algoritmů pro šifrování textu: Library of Algorithms for Text Ciphering. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/55873

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mikulka, Jiří. “Knihovna algoritmů pro šifrování textu: Library of Algorithms for Text Ciphering.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/55873.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mikulka, Jiří. “Knihovna algoritmů pro šifrování textu: Library of Algorithms for Text Ciphering.” 2019. Web. 14 Aug 2020.

Vancouver:

Mikulka J. Knihovna algoritmů pro šifrování textu: Library of Algorithms for Text Ciphering. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/55873.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mikulka J. Knihovna algoritmů pro šifrování textu: Library of Algorithms for Text Ciphering. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/55873

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

2. Miloš, Jiří. Kryptografické metody zabezpečení dat: Cryptographic methods of data security.

Degree: 2019, Brno University of Technology

 Bachelor‘s thesis on theme Cryptographic methods of data security consists of three parts. In first part are itemized general theoretical principles, which employs in these… (more)

Subjects/Keywords: Kryptografie; symetrická kryptografie; asymetrická kryptografie; hashovací algoritmy; kryptoanalýza; síťové útoky; programovací jazyk C/C++; Cryptography; symmetric cryptography; assymmetric cryptgraphy; hash-functions; cryptoanalysis; network attacks; C/C++ programming language

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miloš, J. (2019). Kryptografické metody zabezpečení dat: Cryptographic methods of data security. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/10464

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Miloš, Jiří. “Kryptografické metody zabezpečení dat: Cryptographic methods of data security.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/10464.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Miloš, Jiří. “Kryptografické metody zabezpečení dat: Cryptographic methods of data security.” 2019. Web. 14 Aug 2020.

Vancouver:

Miloš J. Kryptografické metody zabezpečení dat: Cryptographic methods of data security. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/10464.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Miloš J. Kryptografické metody zabezpečení dat: Cryptographic methods of data security. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/10464

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

3. Forman, Tomáš. Portál pro podporu výuky kryptografie: Portal for the support of cryptography instruction.

Degree: 2018, Brno University of Technology

 The main goal of this master's thesis is building of web portal for presentation basic cryptography algorithms. Those algorithms would be explained in the theoretical… (more)

Subjects/Keywords: kryptografie; kryptoanalýza; šifrování; šifra; hashování; hash; asymetrická kryptografie; symetrická kryptografie; CMS; Joomla; Java; webdesign; SEO; cryptography; cryptanalysis; encryption; cipher; hash; asymmetric cryptography; symmetric cryptography; CMS; Joomla; Java; web design; SEO

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Forman, T. (2018). Portál pro podporu výuky kryptografie: Portal for the support of cryptography instruction. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/4638

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Forman, Tomáš. “Portál pro podporu výuky kryptografie: Portal for the support of cryptography instruction.” 2018. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/4638.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Forman, Tomáš. “Portál pro podporu výuky kryptografie: Portal for the support of cryptography instruction.” 2018. Web. 14 Aug 2020.

Vancouver:

Forman T. Portál pro podporu výuky kryptografie: Portal for the support of cryptography instruction. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/4638.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Forman T. Portál pro podporu výuky kryptografie: Portal for the support of cryptography instruction. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/4638

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

4. Ohnút, Petr. Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA.

Degree: 2020, Brno University of Technology

This Bachelors's thesis is focused on the description of SHA3 algorithm, an FPGA technology, and the possibility to implement the SHA3 algorithm into FPGA. It also deals with our design and implementation in Python and VHDL. Advisors/Committee Members: Valach, Soběslav (advisor), Macho, Tomáš (referee).

Subjects/Keywords: FPGA; Kryptografie; SHA-3; FPGA; Cryptography; SHA-3

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ohnút, P. (2020). Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/190626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ohnút, Petr. “Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA.” 2020. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/190626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ohnút, Petr. “Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA.” 2020. Web. 14 Aug 2020.

Vancouver:

Ohnút P. Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/190626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ohnút P. Implementace algoritmu SHA-3 do FPGA: Implementation of SHA-3 algorithm in FPGA. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/190626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

5. Balvín, David. Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android.

Degree: 2020, Brno University of Technology

 The main task of this thesis was to design and implement an application that would handle encrypted communication using the GSM network. The app is… (more)

Subjects/Keywords: Android; aplikace; kryptografie; SMS; GSM; Android; application; cryptography; SMS; GSM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Balvín, D. (2020). Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/187260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Balvín, David. “Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android.” 2020. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/187260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Balvín, David. “Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android.” 2020. Web. 14 Aug 2020.

Vancouver:

Balvín D. Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/187260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Balvín D. Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/187260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

6. Foltýn, Tomáš. Implementace kryptografických algoritmů v FPGA: Implementation of Cryptographic Algorithms in FPGA.

Degree: 2018, Brno University of Technology

 This thesis describes design and implementation of the AES cryptographic algorithm in FPGA. Design of this unit aims at compact size in exchange for lower… (more)

Subjects/Keywords: Kryptografie; FPGA; AES; FITkit; VHDL; Cryptography; FPGA; AES; FITkit; VHDL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Foltýn, T. (2018). Implementace kryptografických algoritmů v FPGA: Implementation of Cryptographic Algorithms in FPGA. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Foltýn, Tomáš. “Implementace kryptografických algoritmů v FPGA: Implementation of Cryptographic Algorithms in FPGA.” 2018. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/61809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Foltýn, Tomáš. “Implementace kryptografických algoritmů v FPGA: Implementation of Cryptographic Algorithms in FPGA.” 2018. Web. 14 Aug 2020.

Vancouver:

Foltýn T. Implementace kryptografických algoritmů v FPGA: Implementation of Cryptographic Algorithms in FPGA. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/61809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Foltýn T. Implementace kryptografických algoritmů v FPGA: Implementation of Cryptographic Algorithms in FPGA. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/61809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

7. Jiránek, Karel. Generování hesel na základě pravidel: Rule-Based Password Generation.

Degree: 2019, Brno University of Technology

 The thesis describes password generation based on rules and parallel generation of passwords on GPU with OpenCL framework. The thesis addresses the design of a… (more)

Subjects/Keywords: Generování hesel; Fitcrack; kryptografie; OpenCL; Password generation; Fitcrack; cryptography; OpenCL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiránek, K. (2019). Generování hesel na základě pravidel: Rule-Based Password Generation. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69706

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jiránek, Karel. “Generování hesel na základě pravidel: Rule-Based Password Generation.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/69706.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jiránek, Karel. “Generování hesel na základě pravidel: Rule-Based Password Generation.” 2019. Web. 14 Aug 2020.

Vancouver:

Jiránek K. Generování hesel na základě pravidel: Rule-Based Password Generation. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/69706.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jiránek K. Generování hesel na základě pravidel: Rule-Based Password Generation. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/69706

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

8. Trchalíková, Jana. Algoritmy pro určení řádu eliptické křivky s využitím v kryptografii: Algorithms for Determining the Order of the Group of Points on an EllipticCurve with Application in Cryptography.

Degree: 2019, Brno University of Technology

 The elliptic curves are plane curves whose points satisfy the Weierstrass equation. Their main application is in the cryptography, where they represent an important device… (more)

Subjects/Keywords: Eliptická křvka; řád; kryptografie; Elliptic curve; order; cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trchalíková, J. (2019). Algoritmy pro určení řádu eliptické křivky s využitím v kryptografii: Algorithms for Determining the Order of the Group of Points on an EllipticCurve with Application in Cryptography. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/874

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Trchalíková, Jana. “Algoritmy pro určení řádu eliptické křivky s využitím v kryptografii: Algorithms for Determining the Order of the Group of Points on an EllipticCurve with Application in Cryptography.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/874.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Trchalíková, Jana. “Algoritmy pro určení řádu eliptické křivky s využitím v kryptografii: Algorithms for Determining the Order of the Group of Points on an EllipticCurve with Application in Cryptography.” 2019. Web. 14 Aug 2020.

Vancouver:

Trchalíková J. Algoritmy pro určení řádu eliptické křivky s využitím v kryptografii: Algorithms for Determining the Order of the Group of Points on an EllipticCurve with Application in Cryptography. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/874.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Trchalíková J. Algoritmy pro určení řádu eliptické křivky s využitím v kryptografii: Algorithms for Determining the Order of the Group of Points on an EllipticCurve with Application in Cryptography. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/874

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

9. Jančík, Jakub. Demonstrátor šifrátoru z Lego Technic: Lego Technic encryption demonstrator.

Degree: 2019, Brno University of Technology

 The bachelor thesis is mostly about mechanical encryption. Primary task was to build demonstrator encryptor using only LEGO Technic building kit, which would allow polyalphabetical… (more)

Subjects/Keywords: Steganografie; kryptografie; kryptoanalýza; šifra; Enigma.; Steganography; cryptography; cryptanalysis; cipher; Enigma.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jančík, J. (2019). Demonstrátor šifrátoru z Lego Technic: Lego Technic encryption demonstrator. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/82156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jančík, Jakub. “Demonstrátor šifrátoru z Lego Technic: Lego Technic encryption demonstrator.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/82156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jančík, Jakub. “Demonstrátor šifrátoru z Lego Technic: Lego Technic encryption demonstrator.” 2019. Web. 14 Aug 2020.

Vancouver:

Jančík J. Demonstrátor šifrátoru z Lego Technic: Lego Technic encryption demonstrator. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/82156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jančík J. Demonstrátor šifrátoru z Lego Technic: Lego Technic encryption demonstrator. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/82156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

10. Rácek, Luboš. Zabezpečení komunikace vestavěného systému: Secure Communication in Embedded Systems.

Degree: 2019, Brno University of Technology

 Bachelor’s thesis focuses on a design and analysis of protocol to provide secure communication using a hardware accelerator. The protocol will be designed with low… (more)

Subjects/Keywords: omezená zařízení; asymetrická kryptografie; kryptografie elyptických křivek; akcelerátor; autentizační modely; mikrokontrolér; limited devices; asymmetric cryptography; elliptic curve cryptography; accelerator; authentication models; microcontroller

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rácek, L. (2019). Zabezpečení komunikace vestavěného systému: Secure Communication in Embedded Systems. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/34275

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rácek, Luboš. “Zabezpečení komunikace vestavěného systému: Secure Communication in Embedded Systems.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/34275.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rácek, Luboš. “Zabezpečení komunikace vestavěného systému: Secure Communication in Embedded Systems.” 2019. Web. 14 Aug 2020.

Vancouver:

Rácek L. Zabezpečení komunikace vestavěného systému: Secure Communication in Embedded Systems. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/34275.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rácek L. Zabezpečení komunikace vestavěného systému: Secure Communication in Embedded Systems. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/34275

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

11. Walek, Vladislav. Moderní asymetrické kryptosystémy: Modern Asymmetric Cryptosystems.

Degree: 2019, Brno University of Technology

 Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The asymmetric cryptosystems include RSA, ElGamal, Elliptic Curves and others. Generally,… (more)

Subjects/Keywords: Kryptografie; Asymetrická kryptografie; faktorizace; problém diskretního logaritmu; RSA; ElGamal; McEliece; eliptické křivky; NTRU encrypt; Cryptography; Asymmetric cryptography; factorization; discrete logarith problem; RSA; ElGamal; McEliece; Elliptic Curves; NTRU Encrypt

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Walek, V. (2019). Moderní asymetrické kryptosystémy: Modern Asymmetric Cryptosystems. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/6225

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Walek, Vladislav. “Moderní asymetrické kryptosystémy: Modern Asymmetric Cryptosystems.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/6225.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Walek, Vladislav. “Moderní asymetrické kryptosystémy: Modern Asymmetric Cryptosystems.” 2019. Web. 14 Aug 2020.

Vancouver:

Walek V. Moderní asymetrické kryptosystémy: Modern Asymmetric Cryptosystems. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/6225.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Walek V. Moderní asymetrické kryptosystémy: Modern Asymmetric Cryptosystems. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/6225

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

12. Dobiáš, Patrik. Asymetrická kryptografie na FPGA: Asymmetric Cryptography on FPGA.

Degree: 2020, Brno University of Technology

 This bachelor thesis deals with the analysis of existing hardware implementations of asymmetric cryptographic schemes on the FPGA platform and the then implementation of the… (more)

Subjects/Keywords: Asymetrická kryptografie; ECDSA; Ed25519; FPGA; VHDL; Asymmetric cryptography; ECDSA; Ed25519; FPGA; VHDL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dobiáš, P. (2020). Asymetrická kryptografie na FPGA: Asymmetric Cryptography on FPGA. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/190233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dobiáš, Patrik. “Asymetrická kryptografie na FPGA: Asymmetric Cryptography on FPGA.” 2020. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/190233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dobiáš, Patrik. “Asymetrická kryptografie na FPGA: Asymmetric Cryptography on FPGA.” 2020. Web. 14 Aug 2020.

Vancouver:

Dobiáš P. Asymetrická kryptografie na FPGA: Asymmetric Cryptography on FPGA. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/190233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dobiáš P. Asymetrická kryptografie na FPGA: Asymmetric Cryptography on FPGA. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/190233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

13. Lacko, Peter. Kryptografický protokol pro správu a schvalování verzí dokumentů: The Cryptographic Protocol for Management and Approval of Document Versions.

Degree: 2018, Brno University of Technology

 This work deals with design and implementation of the system for document management and versioning. The first part contains description of related work. In the… (more)

Subjects/Keywords: správa dokumentů; verzování; kryptografie; PKI; RMIAS; document management; versioning; cryptography; PKI; RMIAS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lacko, P. (2018). Kryptografický protokol pro správu a schvalování verzí dokumentů: The Cryptographic Protocol for Management and Approval of Document Versions. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61951

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lacko, Peter. “Kryptografický protokol pro správu a schvalování verzí dokumentů: The Cryptographic Protocol for Management and Approval of Document Versions.” 2018. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/61951.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lacko, Peter. “Kryptografický protokol pro správu a schvalování verzí dokumentů: The Cryptographic Protocol for Management and Approval of Document Versions.” 2018. Web. 14 Aug 2020.

Vancouver:

Lacko P. Kryptografický protokol pro správu a schvalování verzí dokumentů: The Cryptographic Protocol for Management and Approval of Document Versions. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/61951.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lacko P. Kryptografický protokol pro správu a schvalování verzí dokumentů: The Cryptographic Protocol for Management and Approval of Document Versions. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/61951

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

14. Balvín, David. Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android.

Degree: 2019, Brno University of Technology

 The main purpose of this thesis is to design and implement an application that would handle encrypted communication using several protocols or existing applications. The… (more)

Subjects/Keywords: Android; aplikace; kryptografie; SMS; GSM; textové komunikátory; Android; application; cryptography; SMS; GSM; text communicators

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Balvín, D. (2019). Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/84858

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Balvín, David. “Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/84858.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Balvín, David. “Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android.” 2019. Web. 14 Aug 2020.

Vancouver:

Balvín D. Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/84858.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Balvín D. Šifrování nad textovými zprávami pro Android: Message Encryption over Text Messengers for Android. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/84858

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

15. Szturc, Jakub. Softwarová podpora výuky kryptosystémů založených na eliptických křivkách: Software support of education in cryptography area based on elliptic curves.

Degree: 2019, Brno University of Technology

 The master‘s thesis is focusing on cryptography based on elliptical curves consists of four main parts. The first part provides an overview of the basic… (more)

Subjects/Keywords: Kryptografie; asymetrický; eliptický; křivka; těleso; bod; ECDSA; Cryptography; asymmetrical; elliptic; curve; field; point; ECDSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Szturc, J. (2019). Softwarová podpora výuky kryptosystémů založených na eliptických křivkách: Software support of education in cryptography area based on elliptic curves. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/10387

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Szturc, Jakub. “Softwarová podpora výuky kryptosystémů založených na eliptických křivkách: Software support of education in cryptography area based on elliptic curves.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/10387.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Szturc, Jakub. “Softwarová podpora výuky kryptosystémů založených na eliptických křivkách: Software support of education in cryptography area based on elliptic curves.” 2019. Web. 14 Aug 2020.

Vancouver:

Szturc J. Softwarová podpora výuky kryptosystémů založených na eliptických křivkách: Software support of education in cryptography area based on elliptic curves. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/10387.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Szturc J. Softwarová podpora výuky kryptosystémů založených na eliptických křivkách: Software support of education in cryptography area based on elliptic curves. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/10387

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

16. Truneček, Petr. Kryptografické protokoly v praxi: Cryptographic protocols in practice.

Degree: 2019, Brno University of Technology

 The purpose of this work was first to describe the requirements for cryptographic protocols. Furthermore, the classification of these protocols should have been made with… (more)

Subjects/Keywords: Kryptografie; Kryptografické protokoly; CSP; FDR; Yahalom; Cryptography; Cryptographic protocols; CSP; FDR; Yahalom

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Truneček, P. (2019). Kryptografické protokoly v praxi: Cryptographic protocols in practice. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/11034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Truneček, Petr. “Kryptografické protokoly v praxi: Cryptographic protocols in practice.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/11034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Truneček, Petr. “Kryptografické protokoly v praxi: Cryptographic protocols in practice.” 2019. Web. 14 Aug 2020.

Vancouver:

Truneček P. Kryptografické protokoly v praxi: Cryptographic protocols in practice. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/11034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Truneček P. Kryptografické protokoly v praxi: Cryptographic protocols in practice. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/11034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

17. Budík, Lukáš. Postranní kanály v kryptografii: Side channels in cryptography.

Degree: 2019, Brno University of Technology

 This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document… (more)

Subjects/Keywords: kryptoanalýza; kryptografie; kryptografický modul; postranní kanál; RSA; cryptanalysis; cryptograph; cryptographic module; side channel; RSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Budík, L. (2019). Postranní kanály v kryptografii: Side channels in cryptography. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/12189

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Budík, Lukáš. “Postranní kanály v kryptografii: Side channels in cryptography.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/12189.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Budík, Lukáš. “Postranní kanály v kryptografii: Side channels in cryptography.” 2019. Web. 14 Aug 2020.

Vancouver:

Budík L. Postranní kanály v kryptografii: Side channels in cryptography. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/12189.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Budík L. Postranní kanály v kryptografii: Side channels in cryptography. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/12189

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

18. Polášková, Markéta. Zabezpečení uložených dat na pevném disku počítače: Security of data stored on the hard disk.

Degree: 2019, Brno University of Technology

 This work is dedicated to the security of data stored on the hard drive of your computer and using encryption. The first part explains the… (more)

Subjects/Keywords: Kryptologie; kryptografie; kryptoanalýza; pevný disk; postranní kanály; Cryptology; cryptography; cryptanalysis; hard disk; side channels

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Polášková, M. (2019). Zabezpečení uložených dat na pevném disku počítače: Security of data stored on the hard disk. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/34282

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Polášková, Markéta. “Zabezpečení uložených dat na pevném disku počítače: Security of data stored on the hard disk.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/34282.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Polášková, Markéta. “Zabezpečení uložených dat na pevném disku počítače: Security of data stored on the hard disk.” 2019. Web. 14 Aug 2020.

Vancouver:

Polášková M. Zabezpečení uložených dat na pevném disku počítače: Security of data stored on the hard disk. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/34282.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Polášková M. Zabezpečení uložených dat na pevném disku počítače: Security of data stored on the hard disk. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/34282

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

19. Nekuža, Karel. Odlehčená kryptografie pro embedded zařízení: Lightweight cryptography for embedded devices.

Degree: 2019, Brno University of Technology

 This bachelor thesis focuses on lightweight cryptography. The main focus is on block ciphers PRESENT and LBLOCK and hash function PHOTON. The theoretical basis of… (more)

Subjects/Keywords: LBlock; Present; Photon; lehká kryptografie; embedded zařízení; LBlock; Present; Photon; lightweight cryptography; embedded systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nekuža, K. (2019). Odlehčená kryptografie pro embedded zařízení: Lightweight cryptography for embedded devices. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61674

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nekuža, Karel. “Odlehčená kryptografie pro embedded zařízení: Lightweight cryptography for embedded devices.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/61674.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nekuža, Karel. “Odlehčená kryptografie pro embedded zařízení: Lightweight cryptography for embedded devices.” 2019. Web. 14 Aug 2020.

Vancouver:

Nekuža K. Odlehčená kryptografie pro embedded zařízení: Lightweight cryptography for embedded devices. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/61674.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nekuža K. Odlehčená kryptografie pro embedded zařízení: Lightweight cryptography for embedded devices. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/61674

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

20. Holík, Tomáš. MHP aplikace: MHP application.

Degree: 2019, Brno University of Technology

 This Master Thesis is engaged in designing an interactive application for online betting in the DVB-T environment. The application is determined to running at Multimedia… (more)

Subjects/Keywords: digitální televize; MHP; Java; PHP; kryptografie; digital television; MHP; Java; PHP; cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Holík, T. (2019). MHP aplikace: MHP application. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/17440

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Holík, Tomáš. “MHP aplikace: MHP application.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/17440.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Holík, Tomáš. “MHP aplikace: MHP application.” 2019. Web. 14 Aug 2020.

Vancouver:

Holík T. MHP aplikace: MHP application. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/17440.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Holík T. MHP aplikace: MHP application. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/17440

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

21. Špidla, Aleš. Metody optimalizace digitálních podpisů: Methods for optimization of digital signatures.

Degree: 2019, Brno University of Technology

 The thesis briefly describes the digital signatures and basic methods (RSA, DSA, ECDSA) for the creation and verification of the digital signature. The method of… (more)

Subjects/Keywords: kryptografie; podpisové schémata; dávkové ověřování; VANET sítě; cryptography; signature schemes; batch verification; VANET network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Špidla, A. (2019). Metody optimalizace digitálních podpisů: Methods for optimization of digital signatures. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/26844

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Špidla, Aleš. “Metody optimalizace digitálních podpisů: Methods for optimization of digital signatures.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/26844.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Špidla, Aleš. “Metody optimalizace digitálních podpisů: Methods for optimization of digital signatures.” 2019. Web. 14 Aug 2020.

Vancouver:

Špidla A. Metody optimalizace digitálních podpisů: Methods for optimization of digital signatures. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/26844.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Špidla A. Metody optimalizace digitálních podpisů: Methods for optimization of digital signatures. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/26844

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

22. Legéň, Michal. Implementace a testování hashovacího algoritmu MD5: Implementation and testing of MD5 hash algorithm.

Degree: 2019, Brno University of Technology

 Hash functions are one of basic structural components of modern cryptography. Their task is to create unique bit order for entry information called message digests.… (more)

Subjects/Keywords: hashovací funkce MD5; kolize; kryptografie; digitální otisk; hash function MD5; collision; cryptography; message diggest

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Legéň, M. (2019). Implementace a testování hashovacího algoritmu MD5: Implementation and testing of MD5 hash algorithm. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/10449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Legéň, Michal. “Implementace a testování hashovacího algoritmu MD5: Implementation and testing of MD5 hash algorithm.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/10449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Legéň, Michal. “Implementace a testování hashovacího algoritmu MD5: Implementation and testing of MD5 hash algorithm.” 2019. Web. 14 Aug 2020.

Vancouver:

Legéň M. Implementace a testování hashovacího algoritmu MD5: Implementation and testing of MD5 hash algorithm. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/10449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Legéň M. Implementace a testování hashovacího algoritmu MD5: Implementation and testing of MD5 hash algorithm. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/10449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

23. Jégrová, Eliška. Implementace kryptografických primitiv: Implementation of cryptographic primitives.

Degree: 2019, Brno University of Technology

 This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also… (more)

Subjects/Keywords: Kryptografie; 3DES; DES; Blowfish; SHA-3; Tiger; Cryptography; 3DES; DES; Blowfish; SHA-3; Tiger

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jégrová, E. (2019). Implementace kryptografických primitiv: Implementation of cryptographic primitives. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/41373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jégrová, Eliška. “Implementace kryptografických primitiv: Implementation of cryptographic primitives.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/41373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jégrová, Eliška. “Implementace kryptografických primitiv: Implementation of cryptographic primitives.” 2019. Web. 14 Aug 2020.

Vancouver:

Jégrová E. Implementace kryptografických primitiv: Implementation of cryptographic primitives. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/41373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jégrová E. Implementace kryptografických primitiv: Implementation of cryptographic primitives. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/41373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

24. Bělík, David. Ověření uživatelů pomocí chytrých telefonů: User verification based on smart-phones.

Degree: 2018, Brno University of Technology

 The main aim of this diploma thesis is to get acquainted with the area of secure authentication and authorization of users in smartphones on the… (more)

Subjects/Keywords: QR kód; autentizace; kryptografie; hash; Android; implementace; QR code; authentication; hash; cryptography; Android; implementation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bělík, D. (2018). Ověření uživatelů pomocí chytrých telefonů: User verification based on smart-phones. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/32867

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bělík, David. “Ověření uživatelů pomocí chytrých telefonů: User verification based on smart-phones.” 2018. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/32867.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bělík, David. “Ověření uživatelů pomocí chytrých telefonů: User verification based on smart-phones.” 2018. Web. 14 Aug 2020.

Vancouver:

Bělík D. Ověření uživatelů pomocí chytrých telefonů: User verification based on smart-phones. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/32867.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bělík D. Ověření uživatelů pomocí chytrých telefonů: User verification based on smart-phones. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/32867

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

25. Pokorný, Michal. Virtuální sériový port a jeho bezpečný převod na Ethernet: Virtual serial port and its safety conversion to Ethernet.

Degree: 2018, Brno University of Technology

 Bachelor´s thesis try to find a solution to make virtual serial port and its safe transfer on Ethernet. Nowdays communications channels don't offer appropriate security… (more)

Subjects/Keywords: virtuální sériový port; ethernet; AES; kryptografie; autentizace; virtual serial port; ethernet; AES; cryptography; authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pokorný, M. (2018). Virtuální sériový port a jeho bezpečný převod na Ethernet: Virtual serial port and its safety conversion to Ethernet. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/17498

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pokorný, Michal. “Virtuální sériový port a jeho bezpečný převod na Ethernet: Virtual serial port and its safety conversion to Ethernet.” 2018. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/17498.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pokorný, Michal. “Virtuální sériový port a jeho bezpečný převod na Ethernet: Virtual serial port and its safety conversion to Ethernet.” 2018. Web. 14 Aug 2020.

Vancouver:

Pokorný M. Virtuální sériový port a jeho bezpečný převod na Ethernet: Virtual serial port and its safety conversion to Ethernet. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/17498.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pokorný M. Virtuální sériový port a jeho bezpečný převod na Ethernet: Virtual serial port and its safety conversion to Ethernet. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/17498

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

26. Marek, Pavel. Zabezpečení bezdrátové komunikace embedded systému: Secure Communications in Wireless Embedded Systems.

Degree: 2019, Brno University of Technology

 This bachelor thesis deals with secure communication in wireless sensor networks. There are given and described options of encryption protocols that using symmetric and asymmetric… (more)

Subjects/Keywords: Bezdrátové senzorové sítě; symetrická kryptografie; asymetrická kryptografie; zabezpečení komunikace; rozšíření tajného klíče; kryptografie eliptických křivek; nízká spotřeba energie; standard IEEE 802.15.4; Wireless sensor networks; symmetric cryptography; asymmetric cryptography; secure communications; private key expansion; elliptic curve cryptography; low energy consumption; standard IEEE 802.15.4

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marek, P. (2019). Zabezpečení bezdrátové komunikace embedded systému: Secure Communications in Wireless Embedded Systems. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/72269

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marek, Pavel. “Zabezpečení bezdrátové komunikace embedded systému: Secure Communications in Wireless Embedded Systems.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/72269.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marek, Pavel. “Zabezpečení bezdrátové komunikace embedded systému: Secure Communications in Wireless Embedded Systems.” 2019. Web. 14 Aug 2020.

Vancouver:

Marek P. Zabezpečení bezdrátové komunikace embedded systému: Secure Communications in Wireless Embedded Systems. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/72269.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marek P. Zabezpečení bezdrátové komunikace embedded systému: Secure Communications in Wireless Embedded Systems. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/72269

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

27. Bartoš, Milan. Srovnání kryptografických knihoven v prostředí Linux: Comparison of Cryptographic Libraries in Linux Environment.

Degree: 2019, Brno University of Technology

 Bachelor's thesis deals with the comparison of the three cryptographic libraries used in the Linux environment. These are GnuTLS/nettle, NSS and OpenSSL. These are compared… (more)

Subjects/Keywords: kryptografie; kryptografické knihovny; symetrická kryptografie; asymetrická kryptografie; hashovací algoritmy; digitální podpisy; MAC; PKCS; PKCS11; PKCS #7; TLS; SSL; GnuTLS; nettle; NSS; OpenSSL; smart cards; API; cryptography; cryptographic libraries; symetric cryptography; asymetric cryptography; hash algorithms; digital signatures; MAC; PKCS; PKCS #11; PKCS #7; TLS; SSL; GnuTLS; nettle; OpenSSL; smart cards; API

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bartoš, M. (2019). Srovnání kryptografických knihoven v prostředí Linux: Comparison of Cryptographic Libraries in Linux Environment. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bartoš, Milan. “Srovnání kryptografických knihoven v prostředí Linux: Comparison of Cryptographic Libraries in Linux Environment.” 2019. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/54834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bartoš, Milan. “Srovnání kryptografických knihoven v prostředí Linux: Comparison of Cryptographic Libraries in Linux Environment.” 2019. Web. 14 Aug 2020.

Vancouver:

Bartoš M. Srovnání kryptografických knihoven v prostředí Linux: Comparison of Cryptographic Libraries in Linux Environment. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/54834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bartoš M. Srovnání kryptografických knihoven v prostředí Linux: Comparison of Cryptographic Libraries in Linux Environment. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/54834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

28. Klemens, Jakub. Platformově nezávislé úložiště citlivých dat: Platform Independent Storge of Sensitive Data.

Degree: 2020, Brno University of Technology

 This thesis addresses the issues when securing sensitive data for Windows, iOS and MacOS, with the target being to create the ideal key-value data storage… (more)

Subjects/Keywords: Kryptografie; Bezpečnost; Knihovna; C++; Crypto++; Boost; Windows; iOS; MacOS; Cryptography; Security; Library; C++; Crypto++; Boost; Windows; iOS; MacOS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Klemens, J. (2020). Platformově nezávislé úložiště citlivých dat: Platform Independent Storge of Sensitive Data. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/190059

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Klemens, Jakub. “Platformově nezávislé úložiště citlivých dat: Platform Independent Storge of Sensitive Data.” 2020. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/190059.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Klemens, Jakub. “Platformově nezávislé úložiště citlivých dat: Platform Independent Storge of Sensitive Data.” 2020. Web. 14 Aug 2020.

Vancouver:

Klemens J. Platformově nezávislé úložiště citlivých dat: Platform Independent Storge of Sensitive Data. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/190059.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Klemens J. Platformově nezávislé úložiště citlivých dat: Platform Independent Storge of Sensitive Data. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/190059

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

29. Böhmová, Monika. Nastroj pro zabezpeceny start a aktualizaci firmware embedded mikrokontroleru: Tool for secure start and update of embedded device firmware.

Degree: 2020, Brno University of Technology

 This bachelor thesis covers creation of a tool designed for secure boot and update of firmware of embedded microcontrollers. Cryptography algorithms and methods, which were… (more)

Subjects/Keywords: Zabezpečený start; aktualizace firmware; mikrokontroler; kryptografie; soubor SB3; Python.; Secure boot; update firmware; microcontroller; cryptography; SB3 file; Python.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Böhmová, M. (2020). Nastroj pro zabezpeceny start a aktualizaci firmware embedded mikrokontroleru: Tool for secure start and update of embedded device firmware. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/190290

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Böhmová, Monika. “Nastroj pro zabezpeceny start a aktualizaci firmware embedded mikrokontroleru: Tool for secure start and update of embedded device firmware.” 2020. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/190290.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Böhmová, Monika. “Nastroj pro zabezpeceny start a aktualizaci firmware embedded mikrokontroleru: Tool for secure start and update of embedded device firmware.” 2020. Web. 14 Aug 2020.

Vancouver:

Böhmová M. Nastroj pro zabezpeceny start a aktualizaci firmware embedded mikrokontroleru: Tool for secure start and update of embedded device firmware. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/190290.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Böhmová M. Nastroj pro zabezpeceny start a aktualizaci firmware embedded mikrokontroleru: Tool for secure start and update of embedded device firmware. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/190290

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

30. Bača, Jaromír. Protokol s koncovým šifrováním pro IEEE 802.15.4: End-to-end encryption protocol for IEEE 802.15.4.

Degree: 2020, Brno University of Technology

 This thesis explores the topic of encryption of communication between low-voltage de-vices that are controlled by microcontrollers. Two deRFnod development boards wereused in the work,… (more)

Subjects/Keywords: Mikrokontroléry; internet věcí; lightweight síť; asymetrická kryptografie; eliptické křivky; AES; Microcontrollers; Internet of Things; lightweight mesh; asymetry cryptpgraphy; ellipticcurves; AES

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bača, J. (2020). Protokol s koncovým šifrováním pro IEEE 802.15.4: End-to-end encryption protocol for IEEE 802.15.4. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/190302

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bača, Jaromír. “Protokol s koncovým šifrováním pro IEEE 802.15.4: End-to-end encryption protocol for IEEE 802.15.4.” 2020. Thesis, Brno University of Technology. Accessed August 14, 2020. http://hdl.handle.net/11012/190302.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bača, Jaromír. “Protokol s koncovým šifrováním pro IEEE 802.15.4: End-to-end encryption protocol for IEEE 802.15.4.” 2020. Web. 14 Aug 2020.

Vancouver:

Bača J. Protokol s koncovým šifrováním pro IEEE 802.15.4: End-to-end encryption protocol for IEEE 802.15.4. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Aug 14]. Available from: http://hdl.handle.net/11012/190302.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bača J. Protokol s koncovým šifrováním pro IEEE 802.15.4: End-to-end encryption protocol for IEEE 802.15.4. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/190302

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5]

.