Narrow your search

Library

ULiège (11)

KBR (2)

KU Leuven (2)

Belgian Parliament (1)

UGent (1)

UNamur (1)

VUB (1)


Resource type

dissertation (11)

book (2)


Language

English (6)

French (5)


Year
From To Submit

2021 (1)

2019 (1)

2017 (1)

2016 (2)

2002 (1)

More...
Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Dissertation
Une possibilité nouvelle en cryptographie informatique : les fonctions elliptiques
Authors: ---
Year: 1986 Publisher: [S.l.]: [chez l'auteur],

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Cryptography


Dissertation
La cryptographie : concepts, algorithmes et applications
Authors: --- ---
Year: 1998

Loading...
Export citation

Choose an application

Bookmark

Abstract


Dissertation
Contributions de la théorie des courbes elliptiques à l'élaboration de cryptosystèmes à clé publique
Author:
Year: 1997 Publisher: [S.l.]: [chez l'auteur],

Loading...
Export citation

Choose an application

Bookmark

Abstract


Dissertation
Cryptographie et théorie des nombres
Authors: ---
Year: 2002

Loading...
Export citation

Choose an application

Bookmark

Abstract


Dissertation
Development of mobile services to manage electronic health records
Authors: --- --- --- ---
Year: 2016 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

Andaman7 is a mobile application for managing health records, developed by A7 Software company, based in Boncelles. This collaborative app has been designed to allow users to display, edit and exchange medical data, and by these means,to improve the communication between patients and doctors.

This master’s thesis has been conducted as part of the Andaman7 project. The goal consisted in developing mobile services for Andaman7, focusing on the Android version, and more generally, providing new features and solutions to the application.

The goal of the work was reached, as many solutions have been provided. Indeed, different tasks were performed for building or improving the GUI of the Android app: the presentation menu was modified in order to be integrated in a navigation drawer, the handmade toolbar was replaced by an Android built-in Toolbar, the screen rotations and the restoration of the application state were taken in charge, and a splash screen was added. Moreover, the GUI of the rules defining which parts of the patients’ records are shared with other users was re-designed, the languages and translations of the application were integrated. A notification system, based on Google Cloud Messaging, was also implemented. The confidentiality, integrity and origin of the medical data exchanged through the app server with other users was ensured, by integrating some cryptography mechanisms in the app. Finally, an analysis of two possible ways to perform secure backups of the users’ electronic health records was realized.

The present paper reports the choices and implementation details that have been made throughout the thesis, but also presents some alternatives and perspectives for enhancing the provided features in the future.


Dissertation
Cryptosystème de Paillier, protocole de vote et généralisation
Authors: --- --- --- ---
Year: 2016 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

We introduce the cryptosystem of P. Paillier and we apply it to an electronic voting system, as an illustration. Afterwards, we show the generalization of Damgard and Jurik for the cryptosystem. Finally, we give some pseudo code for an implementation of the voting system.


Dissertation
Master thesis : Design and development of a distributed, secure and resilient vault management system
Authors: --- --- --- ---
Year: 2017 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

Today's computer systems are often either vulnerable, or do not allow for the privacy many users are concerned with, because they are run by large companies. The thesis studies a decentralized platform that allows any two entities, human or not, to securely exchange information only them can read. The design of a centralized structure is first drawn, to be extended to a peer-to-peer architecture. Finally, we revise an implementation of the model, which is now available online.


Dissertation
Porting and securing an ad-hoc library for mobile devices
Authors: --- --- --- ---
Year: 2021 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

Today, almost everyone carries a mobile device, which is used for various purposes such as communicating with friends or watching videos on an online video sharing platform. However, it requires the presence of a centralised access point, which is not always available. This restriction could be avoided by transitioning to ad hoc wireless communications, where devices would communicate with each other directly. Even so, there are few resources available for the development of ad hoc applications. This master thesis presents the port of a Java mobile ad hoc library to Dart. Therefore, the ported library could be used by the Flutter framework, which allows to develop ad hoc mobile apps regardless of the mobile platforms used. Since the Java mobile ad hoc library is based on a layered architecture, each layer has been individually ported one by one. Another wireless technology, Bluetooth Low Energy, has been explored and used instead of Bluetooth Classic. Despite having a lower data rate, Bluetooth Low Energy is still used to overcome the limitation of Wi-Fi Direct, which is the non-support for multi-hop communications. Then, a new layer has been introduced and implemented, which is responsible for encryption and decryption of data. As a result, a key management system is needed and the on-demand self-organised public key management has been chosen and implemented for end-to-end secure communication. To provide secure communication beyond the end-to-end secure communication, the CRTDH group key agreement has been implemented and provides the possibility to have secure group communications. Study in the literature has shown that the symmetric cryptography ChaCha20 has proven to be very efficient in terms of computation time and energy consumption.


Dissertation
Elementary statistical methods of cryptography
Authors: --- --- --- ---
Year: 2019 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of this thesis is to study the statistical methods allowing to decrypt messages where a brute attack will be unfeasible. &#13;&#13;After the description of encryption techniques used in pre-modern cryptography and in the Second World War, we will present methods for breaking these classical ciphers with a brief presentation of the cryptanalysis needed to break wartime ciphers. Then, a bayesian method introduced by Turing in a wartime paper for breaking Vigenère cipher will be developed. This work will also investigate the use of Markov Chain Monte Carlo to attack substitution cipher and transposition cipher. Finally, we will discuss how to measure the performances of some techniques presented in the previous chapters based on simulations.

Listing 1 - 10 of 11 << page
of 2
>>
Sort by