Browsing Electrical and Computer Engineering by Subject "Cryptography"
Now showing items 1-9 of 9
-
Area and Energy Optimizations in ASIC Implementations of AES and PRESENT Block Ciphers
(University of Waterloo, 2020-05-25)When small, modern-day devices surface with neoteric features and promise benefits like streamlined business processes, cashierless stores, and autonomous driving, they are all too often accompanied by security risks due ... -
Automated Design Space Exploration and Datapath Synthesis for Finite Field Arithmetic with Applications to Lightweight Cryptography
(University of Waterloo, 2020-05-27)Today, emerging technologies are reaching astronomical proportions. For example, the Internet of Things has numerous applications and consists of countless different devices using different technologies with different ... -
CDCL(Crypto) and Machine Learning based SAT Solvers for Cryptanalysis
(University of Waterloo, 2020-05-15)Over the last two decades, we have seen a dramatic improvement in the efficiency of conflict-driven clause-learning Boolean satisfiability (CDCL SAT) solvers over industrial problems from a variety of applications such as ... -
Design and Analysis of Cryptographic Pseudorandom Number/Sequence Generators with Applications in RFID
(University of Waterloo, 2013-08-22)This thesis is concerned with the design and analysis of strong de Bruijn sequences and span n sequences, and nonlinear feedback shift register (NLFSR) based pseudorandom number generators for radio frequency identification ... -
Design and Cryptanalysis of Lightweight Symmetric Key Primitives
(University of Waterloo, 2020-01-23)The need for lightweight cryptographic primitives to replace the traditional standardized primitives such as AES, SHA-2 and SHA-3, which are unrealistic in constrained environments, has been anticipated by the cryptographic ... -
Establishing Confidence Level Measurements for Remote User Authentication in Privacy-Critical Systems
(University of Waterloo, 2009-06-23)User Authentication is the process of establishing confidence in the User identities presented to an information system. This thesis establishes a method of assigning a confidence level to the output of a user authentication ... -
Fault Tolerant Cryptographic Primitives for Space Applications
(University of Waterloo, 2011-04-28)Spacecrafts are extensively used by public and private sectors to support a variety of services. Considering the cost and the strategic importance of these spacecrafts, there has been an increasing demand to utilize strong ... -
A Flexible Ultralight Hardware Security Module for EPC RFID Tags
(University of Waterloo, 2021-10-01)Due to the rapid growth of using Internet of Things (IoT) devices in daily life, the need to achieve an acceptable level of security and privacy for these devices is rising. Security risks may include privacy threats like ... -
On Message Authentication in 4G LTE System
(University of Waterloo, 2015-08-26)After decades of evolution, the cellular system has become an indispensable part of modern life. Together with the convenience brought by the cellular system, many security issues have arisen. Message integrity protection ...