(available on request)
Once you have agreed with your supervisor on a topic and on a start- and end-date, fill in the corresponding form and complete the respective procedure:
For a BSc thesis, the form is available from the Studienfachberatung .
For a MSc thesis, follow the JMCS process .
Every thesis must be presented near the completion or at the end of the project. Usually this occurs during the semester, within the regular seminar organized by the Cryptology and Data Security group. BSc students must also attend the seminar as a regular participant and get credit for it. The seminar’s title may vary; see the course page for details. You should agree with your supervisor in the initial stage of the thesis on where and when to present your work.
For archiving software and thesis report, log in once to the INF gitlab server with your Campus Account (small login box at the bottom). This creates your user representation inside the server. Then ask your supervisor to create a repository for the project under the group crypto-students according to the pattern:
For a seminar report you may use the sample article template used by the CRYPTO group .
For a BSc thesis a sample template is available on the Cryptography and Data Security group website .
For a Msc thesis, the sample template is available on JMCS website .
The final version of a thesis consists of a single PDF file. Printed copies are not needed. This file must also contain the signed declaration (“Erklärung”) , in which the candidate confirms that she/he personally authored the work. (Print, sign, scan, and include the declaration at the end of the thesis.)
Computer-science research can, roughly, be divided into “systems” and “theory” projects.
In systems research, one builds, experiments, and measures. Research results are typically demonstrated through an evaluation. However, measuring the behavior of a complex system is tricky. If you measure anything in your project, then you should read and follow this useful resource:
Theoretical research demonstrates its insight in abstract form, through algorithms, protocols, and (crypto)schemes described abstractly in the computer-science dialect of the language of mathematics. Here, results are typically demonstrated through proofs. If you author a theoretical thesis, then you should read and follow some advice on mathematical writing, such as:
Mathematical Writing by Knuth, Larrabee, and Roberts ( PDF Format ). Read points 1-27 on pages 1-6.
Many guides to mathematical writing can be found online. Pick one that you like.
Theses are written in English. Refer to a manual of style for guidance on writing scientific texts. You should read and follow at least the first two.
Advice on writing in computer science , published by Renée Miller of the University of Toronto, is a concise summary with pointers to more material.
The BSc thesis template explains how to assemble and format the bibliography using BibTeX.
Advice on Writing, Presentation & Plagiarism from the JMCS programme.
The Elements of Style by Strunk and White is a classic style guide (it even has its own Wikipedia page!) and one can find versions online .
After finishing the thesis, some forms have to be processed:
For BSc, the advisor completes the form and hands it to the Studiensekretariat.
For MSc, you fill in parts “Finishing…” and “Pledge…” on the back of the JMCS form for MSc theses and hand this to the Studiensekretariat at Uni BE. The advisor the completes the JMCS form, fills the form of Uni BE, and hands both to the respective recipients.
Finally, follow the steps to graduate .
Home > SCRIPPS > SCRIPPS_STUDENT > SCRIPPS_THESES > 1816
Cryptography and digital signatures.
Maya Nichols , Scripps College Follow
Document type.
Campus Only Senior Thesis
Bachelor of Arts
Mathematics
Christopher Towse
Douglas Goodwin
Terms of Use for work posted in Scholarship@Claremont .
© 2022 Maya Nichols
What is security and what makes a cryptosystem secure? This thesis explores these questions by looking at the components of a couple public- key cryptosystems and digital signature schemes, attacks against them, and ways of improving security.
Nichols, Maya, "Cryptography and Digital Signatures" (2022). Scripps Senior Theses . 1816. https://scholarship.claremont.edu/scripps_theses/1816
This thesis is restricted to the Claremont Colleges current faculty, students, and staff.
Since May 26, 2022
Advanced Search
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
Grab your spot at the free arXiv Accessibility Forum
Help | Advanced Search
Title: distributed and secure linear algebra -- master thesis.
Abstract: Cryptography is the discipline that allows securing of the exchange of information. In this internship, we will focus on a certain branch of this discipline, secure computation in a network. The main goal of this internship, illustrated in this report, is to adapt a roster of protocols intended to do linear algebra. We want to adapt them to do algebra for matrices with polynomial coefficients. We then wish to make a complete analysis of the different complexities of these protocols.
Comments: | 33 pages, master thesis report |
Subjects: | Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS) |
Cite as: | [cs.CR] |
(or [cs.CR] for this version) | |
Focus to learn more arXiv-issued DOI via DataCite |
Access paper:.
Code, data and media associated with this article, recommenders and search tools.
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .
IMAGES
COMMENTS
Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...
68, Status Report on the First Round of the NIST Lightweight Cryptography Standard-i ation Process [25]. This report summarizes the lightweight cryptography project and highlights the acceptance and selection of the f
More broadly, fully homomorphic encryption improves the e-ciency of secure multiparty computation. Our construction begins with a somewhat homomorphic \boostrappable" encryption scheme that works when the function f is the scheme's own decryption function. We then show how, through recursive self-embedding, bootstrappable encryption gives ...
PDF | The wide use of cryptography is a necessary consequence of the information revolution. With the existence of electronic transmissions on computer... | Find, read and cite all the research ...
cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented in Chapter 2.
Pairing-based cryptography is a relatively young area of cryptography that revolves around a particular function with interesting propreties. It allows the construction of novel cryp-tosystems that are otherwise difficult or impossible to assemble using standard primitives.
On the Theory and Design of Post-Quantum Authenticated Key-Exchange, Encryption and Signatures. Author: Delpech De Saint Guilhem, C. P. R., 21 Mar 2021. Supervisor: Smart, N. P. (Supervisor) & Warinschi, B. (Supervisor) Student thesis: Doctoral Thesis › Doctor of Philosophy (PhD) File.
Improving post-quantum cryptography through cryptanalysis by John Schanck A thesis presented to the University of Waterloo in ful llment of the thesis requirement for the degree of
Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender.
Recent years have seen the importance of ensuring the safety and confidentiality of communication and digital data storage. Thus, secure cryptosystems are needed to guarantee security issues. Among them are asymmetric cryptography algorithms, which have been widely applied for carrying out key distribution and digital signature. This paper focuses on the current mainstream types of asymmetric ...
Abstract—Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best cryptography mechanisms in terms of their performance results. Selection of cryptographic technique according to a particular context is a big question; to answer this question, many existing studies have claimed ...
Available Projects Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography, to the contact noted under Student Projects.
1.1The beginnings of cryptography Cryptography is the science, at the crossroads of mathematics, physics, and computer science, that tends to design protocols to prevent malicious third-party from reading private messages. Even if the development of computers during the 20th century made the research in cryptography explode,
Theses Thesis projects and finished theses with the cryptology and data security research research group at the University of Bern and in the Swiss Joint Master in Computer Science.
A Review Paper on Network Security and Cryptography
Abstract What is security and what makes a cryptosystem secure? This thesis explores these questions by looking at the components of a couple public- key cryptosystems and digital signature schemes, attacks against them, and ways of improving security.
channel and medium related to one's and to communicate securely, and to do so cryptography method is the sole key to it. This research paper will briefly lighten on the history of cryptography, basic definitions related to cryptography and some basic theorems to build different types of cryptography models. This research paper will propose few propositions based on solvability equation and ...
Hybrid cryptography is mainly categorized into two schemes: The first scheme uses. a symmetric algorithm to encrypt data and an asymmetric algorithm to encrypt the. secret key. The other scheme ...
Cryptography is the transformation of readable and understandable data into a form which cannot be understood in order to secure data. cryptography refers exactly to the methodology of concealing the content of messages, the word cryptography comes from the Greek word "Kryptos", that means hidden, and "graphikos" which means writing.
Distributed and secure linear algebra -- Master Thesis. Cryptography is the discipline that allows securing of the exchange of information. In this internship, we will focus on a certain branch of this discipline, secure computation in a network. The main goal of this internship, illustrated in this report, is to adapt a roster of protocols ...
List of dissertations / theses on the topic 'Cryptography'. Scholarly publications with full text pdf download. Related research topic ideas.