National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Using data mining methods in the analysis of credit risk data
Tvaroh, Tomáš ; Witzany, Jiří (advisor) ; Matejašák, Milan (referee)
This thesis focuses on comparison of selected data mining methods for solving classification tasks with the method of logistic regression. First part of the thesis briefly introduces data mining as a scientific discipline and classification task is shown in the context of knowledge data discovery. Next part explains the principle of particular methods amongst which, along with logistic regression, artificial neural networks, classification decision trees and Support Vector Machine method were selected. Together with mathematical background of each algorithm, demonstration of how the classification functions for new examples is mentioned. Analytical part of this thesis tests decribed methods on real-world data from the Lending Club company and they are compared based on classification accuracy. Towards the end, an evaluation of logistic regression is made in terms of whether its majority position is due to historical reasons or for its high classification accuracy compared to other methods.
Analysis of attacks on asymmetric cryptosystems
Tvaroh, Tomáš ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
This thesis analyzes various attacks on underlying computational problem of asymmetric cryptosystems. First part introduces two of the most used problems asymmetric cryptography is based on, which are integer factorization and computation of discrete logarithm. Algorithms for solving these problems are described and for each of them there is a discussion about when the use of this particular algorithm is appropriate and when it isn't. In the next part computational problems are related to algorithms RSA and ECC and it is shown, how solving the underlying problem enables us to crack the cypher. As a part of this thesis an application was developed that measures the efficiency of described attacks and by providing easy-to-understand enumeration of algorithm's steps it can be used to demonstrate how the attack works. Based on the results of performed analysis, most secure asymmetric cryptosystem is selected along with some recommendations regarding key pair generation.
Latest trends in public-key cryptography
Tvaroh, Tomáš ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The goal of this thesis is to describe principles of public-key cryptography, introduce and compare latest algorithms for asymmetric encryption and point out their advantages over the most popular cryptosystem - RSA. At the beginning, this thesis describes the evolution of public-key cryptography, its differences compared to symmetric-key cryptography and possibilities of using it for data encryption and digital signature. Mathematical background as well as principles of RSA are described afterwards. At the end, this thesis focuses on the latest algorithms on the basis of eliptic curves and their advantages over the most common algorithms are pointed out. The comparison is then summarized and a recommendation for the best cryptosystem is offered.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.