Now showing items 1-7 of 7

    • Analysis and Design of Authentication and Encryption Algorithms for Secure Cloud Systems 

      Zhu, Bo (University of Waterloo, 2015-01-16)
      Along with the fast growth of networks and mobile devices, cloud computing has become one of the most attractive and effective technologies and business solutions nowadays. Increasing numbers of organizations and customers ...
    • Blockchain Based Election Architecture using XRPL 

      Ghosh, Arnab (University of Waterloo, 2021-08-24)
      The advent of blockchain technology in 2008 has inspired researchers to explore its applications in various fields including health, inventory management and voting. Governments around the world have been looking for secure ...
    • Digital Signcryption 

      Smith, Clayton D. (University of Waterloo, 2005)
      Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and authenticity. Previously, these two goals had been considered separately, with encryption schemes providing confidentiality ...
    • Hardware Implementations of the Lightweight Welch-Gong Stream Cipher Family using Polynomial Bases 

      Sattarov, Marat (University of Waterloo, 2019-01-28)
      In this thesis we develop a parametrized generic hardware implementation for the Welch-Gong (WG) stream cipher family for low power and low cost applications. WG stream ciphers operate over finite fields, and are comprised ...
    • Randomized Lempel-Ziv Compression for Anti-Compression Side-Channel Attacks 

      Yang, Meng (University of Waterloo, 2018-01-31)
      Security experts confront new attacks on TLS/SSL every year. Ever since the compression side-channel attacks CRIME and BREACH were presented during security conferences in 2012 and 2013, online users connecting to HTTP ...
    • A survey on Traitor Tracing Schemes 

      Chen, Jason (University of Waterloo, 2000)
      When intellectual properties are distributed over a broadcast network, the content is usually encrypted in a way such that only authorized users who have a certain set of keys, can decrypt the content. Some authorized ...
    • Using Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases 

      Tawakol, Abdel Maguid (University of Waterloo, 2016-09-01)
      The Internet has become an essential tool for communication and information access, and with growing demand, new challenges and usage continue to surface. A complimentary tool that came to exist in recent years is Cloud ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages