Essays about: "cryptography in mathematics"
Showing result 6 - 10 of 10 essays containing the words cryptography in mathematics.
-
6. Degree Project in Engineering Physics, First Level Department of Mathematics KTH Royal Institute of Technology
University essay from KTH/Skolan för teknikvetenskap (SCI)Abstract : The study of elliptic curves is an important part of the elds of algebraic geometry and number theory, with many applications in areas such as cryptography. While much of the groundwork has already been laid out, the results often times fall short of giving an easily digestible overview of the subject as a whole. READ MORE
-
7. The Secret Writer
University essay from Konstfack/Institutionen för Konst (K)Abstract : This essay reflects a particular method and way of working that I employ when undertaking artistic research. My artworks are rooted and develop from the situation I find myself in as an artist, the very context I exhibit the work within. I do this by trying to understand this position, both on the micro and macro scale. READ MORE
-
8. Elliptic Curves Cryptography
University essay from Institutionen för datavetenskap, fysik och matematik, DFMAbstract : In the thesis we study the elliptic curves and its use in cryptography. Elliptic curvesencompasses a vast area of mathematics. Elliptic curves have basics in group theory andnumber theory. The points on elliptic curve forms a group under the operation of addition. READ MORE
-
9. Elliptic Curves Cryptography
University essay from Institutionen för datavetenskap, fysik och matematik, DFMAbstract : In the thesis we study the elliptic curves and its use in cryptography. Elliptic curvesencompasses a vast area of mathematics. Elliptic curves have basics in group theory andnumber theory. The points on elliptic curve forms a group under the operation of addition. READ MORE
-
10. Strong user authentication mechanisms
University essay from Institutionen för systemteknikAbstract : For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible. READ MORE