This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also deals with hash functions of which are analysed algorithms of SHA-3 and Tiger in detail
This thesis brings an overview of historical and modern methods and approaches used in cryptography....
(in English): This thesis describes and compares the most popular algorithms used in information sys...
This thesis is concerned with giving both an overview of the application of hash functions in crypto...
This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
A block cipher is the foundation stone of symmetric-key cryptography. Due to its simplicity and high...
The goal of this thesis is to create overview about cryptographic hash fiction. In the first part is...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
The development of modern cryptography is associated with the emergence of computing machines. Since...
Abstract. This paper examines proposals for three cryptographic prim-itives: block ciphers, stream c...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
The cryptographic methods used today are the outcome of an extremely long history of development. Cr...
Nous traitons dans cette thèse de la sécurité de fonctions cryptographiques symétriques. Dans une pr...
Bachelor's thesis deals with analysis of the various cryptographic algorithms that are used for secu...
This bachelor thesis focuses on lightweight cryptography. The main focus is on block ciphers PRESENT...
This thesis brings an overview of historical and modern methods and approaches used in cryptography....
(in English): This thesis describes and compares the most popular algorithms used in information sys...
This thesis is concerned with giving both an overview of the application of hash functions in crypto...
This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
A block cipher is the foundation stone of symmetric-key cryptography. Due to its simplicity and high...
The goal of this thesis is to create overview about cryptographic hash fiction. In the first part is...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
The development of modern cryptography is associated with the emergence of computing machines. Since...
Abstract. This paper examines proposals for three cryptographic prim-itives: block ciphers, stream c...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
The cryptographic methods used today are the outcome of an extremely long history of development. Cr...
Nous traitons dans cette thèse de la sécurité de fonctions cryptographiques symétriques. Dans une pr...
Bachelor's thesis deals with analysis of the various cryptographic algorithms that are used for secu...
This bachelor thesis focuses on lightweight cryptography. The main focus is on block ciphers PRESENT...
This thesis brings an overview of historical and modern methods and approaches used in cryptography....
(in English): This thesis describes and compares the most popular algorithms used in information sys...
This thesis is concerned with giving both an overview of the application of hash functions in crypto...