Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
14692 open access dissertations and theses found for:
if(Elliptic curve)  »   Refine Search
1.
Algorithms in Elliptic Curve Cryptography
by Hutchinson, Aaron, Ph.D.  Florida Atlantic University. 2018: 148 pages; 10980188.
2.
Binary Edwards curves in elliptic curve cryptography
by Enos, Graham, Ph.D.  The University of North Carolina at Charlotte. 2013: 156 pages; 3563153.
3.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
4.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
5.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
7.
On Some Geometric and Algebraic Properties of The Holm Elliptic Curves
by Algarni, Aziza Mohammd, M.S.  Howard University. 2019: 67 pages; 13883031.
8.
On the torsion structure of elliptic curves over cubic number fields
by Wang, Jian, Ph.D.  University of Southern California. 2015: 63 pages; 3722897.
10.
Space-time Codes, Non-associative Division Algebras, and Elliptic Curves
by Limburg, Steve, Ph.D.  University of Colorado at Boulder. 2012: 98 pages; 3508132.
11.
From spiral to spline: Optimal techniques in interactive curve design
by Levien, Raphael Linus, Ph.D.  University of California, Berkeley. 2009: 252 pages; 3426602.
12.
13.
On Elliptic Curves, the ABC Conjecture, and Polynomial Threshold Functions
by Kane, Daniel Mertz, Ph.D.  Harvard University. 2011: 334 pages; 3462779.
14.
Density properties of Euler characteristic -2 surface group, PSL(2, R) character varieties
by Delgado, Robert, Ph.D.  University of Maryland, College Park. 2009: 100 pages; 3359372.
15.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
16.
17.
On the rank of 2-primary part of Selmer group of certain elliptic curves
by Kim, Kwang Hyun, Ph.D.  City University of New York. 2012: 57 pages; 3541487.
18.
19.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
20.
A Comparative Study of Lattice Based Algorithms for Post Quantum Computing
by Easttom, William Charles, II, D.B.A.  Capitol Technology University. 2018: 141 pages; 13901281.
21.
Canonical Surfaces and Hypersurfaces in in Abelian Varieties
by Cesarano, Luca, Ph.D.  Universitaet Bayreuth (Germany). 2018: 92 pages; 10870161.
22.
Geometric and topological ellipticity in cohomogeneity two
by Yeager, Joseph E., Ph.D.  University of Maryland, College Park. 2012: 62 pages; 3517839.
23.
Computing Canonical Heights on Jacobians
by Müller, Jan Steffen, Dr.Nat.  Universitaet Bayreuth (Germany). 2010: 249 pages; 27600523.
24.
Arithmetic Intersections on Modular Curves
by Fukuda, Miguel Daygoro Grados, Ph.D.  Humboldt Universitaet zu Berlin (Germany). 2017: 162 pages; 27733066.
25.
Stratified and steady periodic water waves
by Walsh, Samuel, Ph.D.  Brown University. 2010: 229 pages; 3430224.
26.
Curve Jets, Submanifold Families, and Envelopes
by Mathews, James, Jr., Ph.D.  State University of New York at Stony Brook. 2017: 81 pages; 10621813.
27.
Commutative endomorphism rings of simple abelian varieties over finite fields
by Bradford, Jeremy, Ph.D.  University of Maryland, College Park. 2012: 78 pages; 3557641.
28.
Superconducting-magnatic proximity systems and mathematical analogies to classical mechanics
by Baker, Thomas E., M.S.  California State University, Long Beach. 2012: 103 pages; 1517580.
30.
Efficient Public-Key Watermark Techniques for Authentication
by Jiang, Feng, Ph.D.  Purdue University. 2017: 124 pages; 10618833.
1 - 30 of 14692 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest