National Repository of Grey Literature 150 records found  beginprevious123 - 132nextend  jump to record: Search took 0.00 seconds. 
Comparison of public key cryptography algorithms
Mareš, Jiří ; Stanovský, David (advisor) ; Žemlička, Jan (referee)
In the present work we study comparison of basic public key encryption algorithms - RSA, Rabin and ElGamel method. We derive theoretic complexity of encrypting / decrypting of one block and we derive an expected model of its behavior with the key of double size. We also take practical measurements of speed of each algorithm using keys sized 64 - 4096 bits and we statistically analyze the results. We also mention special cases of some algorithms and discuss the advantages and disadvantages of their practical usage. At the end of this thesis we make a comparison of the speed of algorithms and we also compare the measured data with theoretical hypothesis.
Algorithm for word morphisms fixed points
Matocha, Vojtěch ; Holub, Štěpán (advisor) ; Žemlička, Jan (referee)
In the present work we study the first polynomial algorithm, which tests if the given word is a fixed point of a nontrivial morphism. This work contains an improved worst-case complexity estimate O(m · n) where n denotes the word length and m denotes the size of the alphabet. In the second part of this work we study the union-find problem, which is the crucial part of the described algorithm, and the Ackermann function, which is closely linked to the union-find complexity. We summarize several common methods and their time complexity proofs. We also present a solution for a special case of the union-find problem which appears in the studied algorithm. The rest of the work focuses on a Java implementation, whose time tests correspond to improved upper bound, and a visualization useful for particular entries.
Qudratic field based cryptography
Straka, Milan ; Žemlička, Jan (referee) ; Stanovský, David (advisor)
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann and Williams already in 1988 and more cryptographic schemes followed. Although the resulting protocols are currently not as efficient as those based on elliptic curves, they are comparable to schemes based on RSA and, moreover, their security is believed to be independent of other widely-used protocols including RSA, DSA and elliptic curve cryptography. This work gathers present results in the field of quadratic cryptography. It recapitulates the algebraic theory needed to work with the class group of imaginary quadratic fields. Then it investigates algorithms of class group operations, both asymptotically and practically effective. It also analyses feasible cryptographic schemes and attacks upon them. A library implementing described cryptographic schemes is a part of this work.

National Repository of Grey Literature : 150 records found   beginprevious123 - 132nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.