Showing 1 - 20 results of 24 for search '"DRNTU::Science::Mathematics::Discrete mathematics::Cryptography"', query time: 0.36s Refine Results
  1. 1

    On the Bringer–Chabanne EPIR protocol for polynomial evaluation by Chee, Yeow Meng, Wang, Huaxiong, Zhang, Liang Feng

    Published 2013
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Get full text
    Journal Article
  2. 2

    Analysis of cryptographic hash functions by Guo, Jian

    Published 2011
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  3. 3

    A study of private information retrieval and related primitives. by Zhang, Liang Feng

    Published 2012
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  4. 4

    Rational secret sharing by Zhang, Yun

    Published 2012
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  5. 5

    Analysis of iterated block ciphers by Wei, Lei

    Published 2012
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  6. 6

    On secret sharing schemes and linear codes by Romar Basillaje Dela Cruz

    Published 2013
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  7. 7

    Zero-knowledge proof systems for lattice-based cryptography by Nguyen, Ta Toan Khoa

    Published 2014
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  8. 8

    Secret sharing schemes and polymatroids by Yang, An

    Published 2014
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  9. 9

    Analysis and design of authenticated ciphers by Huang, Tao

    Published 2016
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  10. 10

    Efficient proxy re-encryption design and its application in cloud computing by Du, Jiawei

    Published 2016
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Final Year Project (FYP)
  11. 11

    Differential analysis of the symmetric key cryptosystem by Tjuawinata, Ivan

    Published 2018
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  12. 12

    Cryptanalysis and design of lightweight symmetric-key cryptography by Sim, Siang Meng

    Published 2018
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Thesis
  13. 13

    An interactive web demo for various cipher mode operations by Muhammad Hanif Abd Latif

    Published 2019
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Final Year Project (FYP)
  14. 14

    Privacy-preserving protocols from lattice cryptography by Tan, Benjamin Hong Meng

    Published 2019
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Get full text
    Thesis
  15. 15

    Group signatures with advanced features and lattices by Xu, Yanhong

    Published 2019
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Get full text
    Thesis
  16. 16

    Lattice codes for the Gaussian wiretap channel by Belfiore, Jean-Claude, Oggier, Frederique, Sole, Patrick

    Published 2011
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Get full text
    Conference Paper
  17. 17

    Lattice code design for the Rayleigh fading wiretap channel by Belfiore, Jean-Claude, Oggier, Frederique

    Published 2011
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Get full text
    Conference Paper
  18. 18

    Secrecy gain of Gaussian wiretap codes from unimodular lattices by Lin, Fuchun, Oggier, Frederique

    Published 2012
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Get full text
    Conference Paper
  19. 19

    Min-entropy uncertainty relation for finite-size cryptography by Ng, Nelly Huei Ying., Berta, Mario., Wehner, Stephanie.

    Published 2013
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Get full text
    Journal Article
  20. 20

    Constructions and bounds on linear error-block codes by Ling, San, Özbudak, Ferruh

    Published 2013
    Subjects: “…DRNTU::Science::Mathematics::Discrete mathematics::Cryptography…”
    Get full text
    Get full text
    Journal Article