Search for dissertations about: "authentication codes"

Found 4 swedish dissertations containing the words authentication codes.

  1. 1. Topics in Authentication Theory

    Author : Christian Gehrmann; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; polynomial evaluation; anonymous secret sharing; multiround authentication; group authentication; threshold cryptography; MAC; secret sharing; cryptology; Authentication; authentication codes; Systems engineering; computer technology; Data- och systemvetenskap;

    Abstract : Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e. READ MORE

  2. 2. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings

    Author : Elena Pagnin; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Homomorphic Signatures; Server-Aided Verification; Distance-Bounding Authentication Protocols; Verifiable Com- putation; Biometric Authentication.;

    Abstract : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. READ MORE

  3. 3. Recognition and Evaluation by Video Synthesis Methods and Symmetry Features

    Author : Dereje Teferi Lemma; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Biometrics; eye detection; video synthesis; liveness detection; camera calibration; damascening; Generalized Structure Tensor; symmetry codes;

    Abstract : Biometrics is being increasingly utilized for person authentication. It requires little or no efforts from the user as compared to traditional non-biometric systems where the user has to memorize PIN codes and passwords or carry pass cards and keys that can be easily forgotten or lost. READ MORE

  4. 4. Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems

    Author : Qian Guo; Institutionen för elektro- och informationsteknik; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has become one of the key topics in recent cryptographic research. Its ultimate goal is to search for efficient and secure primitives replacing the factoring- and discrete log-based schemes in service that will be broken in polynomial time by Shor’s algorithm. READ MORE