Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
54 open access dissertations and theses found for:
if(Cryptanalysis)  »   Refine Search
1.
Linear Cryptanalysis of Reduced-round Simon-like Ciphers Using Super Rounds
by Almukhlifi, Reham S., Ph.D.  The George Washington University. 2020: 315 pages; 27834241.
2.
A Comparative Study of Lattice Based Algorithms for Post Quantum Computing
by Easttom, William Charles, II, D.B.A.  Capitol Technology University. 2018: 141 pages; 13901281.
4.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
5.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
6.
Advanced bit manipulation instructions: Architecture, implementation and applications
by Hilewitz, Yedidya, Ph.D.  Princeton University. 2008: 232 pages; 3332424.
7.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
8.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
9.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
10.
Server management system
by Pandey, Rinku Omkarnath, M.S.  California State University, Long Beach. 2015: 44 pages; 1604881.
12.
Enhancing IoT Security with Blockchain
by Liu, Chunchi, Ph.D.  The George Washington University. 2020: 133 pages; 28091048.
14.
Phonics curriculum-based measurement: An initial study of reliability and validity
by Swanson, Chad C., Psy.D.  Alfred University. 2014: 125 pages; 3619869.
16.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
17.
Automated Detection of Semagram-Laden Images
by Cerkez, Paul S., Ph.D.  Nova Southeastern University. 2012: 238 pages; 3505651.
18.
RSA-based key compromised resistant protocol (KCR) for large databases
by Alharbi, Fatemah Mordhi, M.S.  California State University, Los Angeles. 2013: 59 pages; 1553319.
19.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
20.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
21.
Factorization via the Chinese Remainder Theorem: Computational methods to enhance rapid key processing and decryption
by Hines, Steven T., M.S.C.S.  California State University, Long Beach. 2012: 82 pages; 1522231.
22.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
23.
Enhanced Secondary Bus Microarchitecture
by O'Farrell, John William, Ph.D.  Auburn University. 2011: 96 pages; 3480707.
24.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
25.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
26.
Collusion Preserving Computation
by Alwen, Joel, Ph.D.  New York University. 2011: 105 pages; 3482849.
27.
Torture: The suppression of the imagination
by Coffey, Diane P., Ph.D.  Pacifica Graduate Institute. 2011: 235 pages; 3500721.
28.
Software Reverse Engineering education
by Cipresso, Teodoro, M.S.  San Jose State University. 2009: 112 pages; 1478574.
30.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
1 - 30 of 54 displayed.
  1    2   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest