National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Cryptocurrency
Šelinga, Martin ; Komosný, Dan (referee) ; Zeman, Václav (advisor)
In this bachelor thesis are analyzed elementary cryptographical techniques which are used among others also in cryptocurrencies. In second part is analysis and detail description of most used cryptocurrencies. In last part is description of simple web application which will demonstrate function of cryptocurrencies.
Application for Demonstration of Hash Algorithms SHA-1 and SHA-2
Siska, Josef ; Petrlík, Jiří (referee) ; Novotňák, Jiří (advisor)
In this thesis, the theory related to the hash algorithms SHA-1 and SHA-2 is presented, along with a description of possible implementation of an application that demonstrates how these algorithms work. The first part of this thesis describes the principles of construction of hash functions, their use and history of selected hash functions. The two following chapters present conventions and algorithms of the SHA-1 and SHA-2. The next chapter describes the general concepts related to the attacks on the hash functions and selected attacks are presented in more detail. The last two chapters outline the design and implementation of an application that was created as part of this work. In the end the evaluation of results of this thesis and proposals for its possible continuation are presented.
Cryptocurrency
Šelinga, Martin ; Komosný, Dan (referee) ; Zeman, Václav (advisor)
In this bachelor thesis are analyzed elementary cryptographical techniques which are used among others also in cryptocurrencies. In second part is analysis and detail description of most used cryptocurrencies. In last part is description of simple web application which will demonstrate function of cryptocurrencies.
Application for Demonstration of Hash Algorithms SHA-1 and SHA-2
Siska, Josef ; Petrlík, Jiří (referee) ; Novotňák, Jiří (advisor)
In this thesis, the theory related to the hash algorithms SHA-1 and SHA-2 is presented, along with a description of possible implementation of an application that demonstrates how these algorithms work. The first part of this thesis describes the principles of construction of hash functions, their use and history of selected hash functions. The two following chapters present conventions and algorithms of the SHA-1 and SHA-2. The next chapter describes the general concepts related to the attacks on the hash functions and selected attacks are presented in more detail. The last two chapters outline the design and implementation of an application that was created as part of this work. In the end the evaluation of results of this thesis and proposals for its possible continuation are presented.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.