Skip to Content
Toggle navigation
Switch language
English
Switch language
Deutsch
English
Español
Français
Italiano
Português do Brasil
中文
Login
ScholarsArchive@OSU
Home
About
Help
Contact
Search ScholarsArchive@OSU
Go
Advanced Search
Search Constraints
Start Over
Filtering by:
Advisor
Koc, Cetin Kaya
Remove constraint Advisor: Koc, Cetin Kaya
Decade
2000-2009
Remove constraint Decade: 2000-2009
1
-
25
of
25
Sort by Relevance
Relevance
Title [A-Z]
Title [Z-A]
Date Created ▼
Date Created ▲
Date Uploaded ▼
Date Uploaded ▲
Number of results to display per page
50 per page
10
per page
20
per page
50
per page
100
per page
View results as:
List
Gallery
Masonry
Search Results
A timing attack on software implementations of RSA
Theory and implementation of the cache behavior analysis attack on DES
Java byte code obfuscator
Improved Montgomery Algorithms using special primes and impact on Elliptic Curve Digit...
Random number generation on handheld devices for cryptographic applications
Efficient wireless security protocols based on elliptic curve cryptography
Improving the Karatsuba-Ofman multiplication algorithm for special applications
Implementation aspects of elliptic curve cryptography
New algorithms and architectures for arithmetic in GF(2[superscript m]) suitable for e...
New methods for finite field arithmetic
Timing Attacks on Software Implementation of RSA
Secure Instant Messaging : the Jabber protocol
ECDSA optimizations on ARM processor for a NIST curve over GF(2m)
ECDSA optimizations on an ARM processor for a NIST curve over GF(p)
Optimizing the advanced encryption standard on Intel's SIMD architecture
Spectral modular arithmetic
An in-depth analysis of common software vulnerabilities and their solutions
Fast hashing on pentium SIMD architecture
Symmetric encryption with multiple keys : techniques and applications
Hardware encryption using the MPC180 security co-processor
Hardware realization for Advanced Encryption Standard key generation
A comparative study of AES implementations on ARM processors
Advances in side-channel cryptanalysis : microarchitectural attacks
Cryptanalysis and enhancement of authentication protocols
A Java implementation of the elliptic curve digital signature algorithm using NIST cur...
Toggle facets
Limit your search
Academic Affiliation
Electrical Engineering and Computer Science
13
Electrical and Computer Engineering
8
Computer Science
3
Advisor
Koc, Cetin Kaya
[remove]
25
Schmidt, Thomas A.
1
Commencement Year
Commencement Year range begin
–
Commencement Year range end
Current results range from
2001
to
2007
View distribution
Committee Member
Bose, Bella
3
Budd, Timothy
3
Traylor, Roger
2
Adams, Paul
1
Baker, Greg
1
more
Committee Members
»
Creator
Aciicmez, Onur
2
Almanei, Saleh
1
Aydos, Murat
1
Banerjee, Uday
1
Barlow, Lelia C.
1
more
Creators
»
Date
Date range begin
–
Date range end
Current results range from
2000
to
2006
View distribution
Decade
2000-2009
[remove]
25
Degree Field
Electrical and Computer Engineering
19
Computer Science
6
Degree Level
Master's
16
Doctoral
8
Bachelor's
1
Degree Name
Master of Science (M.S.)
16
Doctor of Philosophy (Ph.D.)
8
Honors Bachelor of Science (H.B.S.)
1
File Format
application/pdf
2
application/msword
1
pdf
1
Language
English [eng]
25
License
All rights reserved
13
Non-Academic Affiliation
Oregon State University. Graduate School
20
Oregon State University. Honors College
1
Peer Reviewed
No
23
Resource Type
Masters Thesis
12
Dissertation
8
Capstone Project
4
Honors College Thesis
1
Rights Statement
In Copyright
20
Copyright Not Evaluated
5
Subject
Data encryption (Computer science)
10
Computer algorithms
2
Computer security
2
Computers -- Access control
2
Curves, Elliptic
2
more
Subjects
»