National Repository of Grey Literature 24 records found  beginprevious21 - 24  jump to record: Search took 0.02 seconds. 

Multipurpose hall in Hodonín
Grufíková, Markéta ; Barnat,, Jan (referee) ; Šmak, Milan (advisor)
Master´s thesis describes the design and the check of the construction of the art gallery. This hall has the elliptical ground plan, the main dimensions are 25 x 40 m and the height is 12 m. The structure consists of 24 supporting curved ribs, which are supported on elliptical ring of steel at the top of the construction. Between the ribs are inserted purlins, which support the perimeter cladding. The structure is designed alternatively like the system of the timber solid beams from the glued laminated timber and the system of the steel truss girders.

Modern Asymmetric Cryptosystems
Walek, Vladislav ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The asymmetric cryptosystems include RSA, ElGamal, Elliptic Curves and others. Generally, asymmetric cryptography is mainly used for secure short messages and transmission encryption key for symmetric cryptography. The thesis deals with these systems and implements selected systems (RSA, ElGamal, McEliece, elliptic curves and NTRU) into the application. The application can test the features of chosen cryptosystems. These systems and their performance are compared and evaluated with the measured values. These results can predict the future usage of these systems in modern informatics systems.


Diffie-Hellman key exchange protocol
Člupek, Vlastimil ; Burda, Karel (referee) ; Sobotka, Jiří (advisor)
In this bachelor's thesis there is explained principle of cryptography, encryption methods and primarily cryptographic protocol key exchange Diffie-Hellman. There is described key exchange process via public channel. Problem of discrete logarithm. Attack "Man in the middle" on this protocol and protection against this attack. Subsequently there is described a newer version of this protocol, which work's with elliptic curves. Its name is Elliptic Curve Diffie-Hellman (ECDH). In this protocol there is hereinafter described a procedure of calculate a secret point on elliptic curve. Problem of Elliptic discrete logarithm. Attack "Man in the middle" on protocol ECDH and protection against this attack. Furthermore this thesis deals with analyzing mutual compatibility between protocol DH and ECDH and its possible solutions.