• Cryogenic temperature deformation behaviour of two Al-Mg-Si alloys 

      Xu, Zebing (Doctoral theses at NTNU;2017:11, Doctoral thesis, 2017)
      A comprehensive study was carried out to clarify the effects of cryogenic temperature on mechanical properties and microstructure of two peak-aged Al-Mg-Si profiles, i.e., fully recrystallized AA6060 and fibrous AA6082. ...
    • Cryogenic vs. absorption biogas upgrading in liquefied biomethane production – An energy efficiency analysis 

      Hashemi, Sayed Ebrahim; Sarker, Shiplu; Lien, Kristian Myklebust; Schnell, Sondre Kvalvåg; Austbø, Bjørn (Journal article; Peer reviewed, 2019)
      Production of liquefied biomethane (LBM) from biogas comprises two major energy intensive processes; upgrading to increase the methane concentration and refrigeration to liquefy the upgraded biogas. Amine-based absorption ...
    • Cryptanalysis of a cascade of non-uniformly clocked linear feedback shift registers 

      Shi, Lelai (Master thesis, 2010)
      In this thesis, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generators employing linear feedback shift registers (LFSRs) with so-called irregular clocking. The cascade of LFSRs is a well ...
    • Cryptanalysis of a generic one-round key exchange protocol with strong security 

      Yang, Zheng; Lai, Junyu; Li, Guoyuan (Journal article, 2017)
      In Public-Key Cryptography (PKC) 2015, Bergsma et al. introduced an interesting one-round key exchange protocol (which will be referred to as BJS scheme) with strong security in particular for perfect forward secrecy (PFS). ...
    • Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce 

      Shi, Lelai; Liu, Suhui; Petrovic, Slobodan (Journal article; Peer reviewed, 2019)
      In this paper, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generators employing linear feedback shift registers (LFSRs) with so-called irregular clocking. The cascade of LFSRs is a well-known ...
    • Cryptanalysis of IEEE 802.11i TKIP 

      Halvorsen, Finn Michael; Haugen, Olav (Master thesis, 2009)
      The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Up until November 2008, TKIP was believed to be a secure alternative to WEP, although some weak points were ...
    • Cryptanalysis of IEEE 802.11i TKIP 

      Halvorsen, Finn Michael; Haugen, Olav (Master thesis, 2009)
      The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Up until November 2008, TKIP was believed to be a secure alternative to WEP, although some weak points were ...
    • Cryptanalysis of IEEE 802.11i TKIP. 

      Lodhi, Ammar (Master thesis, 2010)
      This thesis is based upon the work of Beck and Tews [ 24 ]. It presents and experimentally Validate the Beck and Tews attack on a network with QoS client Associated with a Non- QoS AP.This is done by Slightly extending the ...
    • Cryptanalysis of Irregularly Clocked LFSR: using approximate RBP search on FPGA 

      Øverbø, Magnus (Master thesis, 2019)
      Kryptoanalyse av et kryptosystem som benytter en Binary Rate Multiplier (BRM), 0/1 klokking, som nøkkelgenerator resulterer i at Siegenthaler's klassiske korrelasjonsangrep[4] ikke kan benyttes. Dette pga. at kryptoteksten ...
    • Cryptic choice of conspecific sperm controlled by the impact of ovarian fluid on sperm swimming behavior 

      Yeates, SE; Diamond, SE; Einum, Sigurd; Emerson, Brent C.; Holt, WV; Gage, MJG (Journal article; Peer reviewed, 2013)
      Despite evidence that variation in male–female reproductive compatibility exists in many fertilization systems, identifying mechanisms of cryptic female choice at the gamete level has been a challenge. Here, under risks ...
    • Cryptic inter- and intraspecific variation in Norwegian Mordellistena (Coleoptera, Mordellidae) 

      Fosse, Aksel Johan (Master thesis, 2022)
      Abstract will be available on 2023-01-31
    • Cryptic Variations of Olivene and Clinopyroxene in the RF-4 Drill-Core: - A geochemical study of the Reinfjord Ultramafic Complex, Norway. 

      Grannes, Kim Rune Bragstad (Master thesis, 2016)
      The aim of the study is to estimate the cryptic variations of whole-rock samples as well as in olivine and clinopyroxene below and throughout the Ni-Cu reefs in the RF-4 drill-core and to study the relationship between the ...
    • Cryptocurrencies and the threat versus the act event of geopolitical risk 

      Kamal, Md Rajib; Wahlstrøm, Ranik Raaen (Peer reviewed; Journal article, 2023)
      We examine the reactions of the cryptocurrency market to two events that occurred during the escalation of the Russia–Ukraine war in February 2022. Using hourly data, we find that the escalation exerted a negative influence ...
    • Cryptocurrency price dynamics: An analysis of Bitcoin’s price driving factors 

      Nordstrøm, Frans B. Gyllenhammar; Krogstad, Erlend Aune (Master thesis, 2018)
      This paper aims to enhance the understanding of which factors affect the price development of Bitcoin in order for investors to make sound investment decisions. Previous literature covers only to a small extent the highly ...
    • Cryptocurrency price dynamics: An analysis of Bitcoin’s price driving factors 

      Nordstrøm, Frans B. Gyllenhammar; Krogstad, Erlend Aune (Master thesis, 2018)
      This paper aims to enhance the understanding of which factors affect the price development of Bitcoin in order for investors to make sound investment decisions. Previous literature covers only to a small extent the highly ...
    • Cryptographic access control for big data platforms 

      Viken, Christoffer (Master thesis, 2017)
      This thesis has looked into the performance of select cryptographic algorithms and compared them to each other in the context of big data. The algorithms compared are Advanced Encryption Standard (AES), RSA, and a ...
    • Cryptographic Analysis of Voting Systems 

      Solstad, Olav Dahl (Master thesis, 2013)
      Coercion-resistance is defined and used to analyze/discuss the voting systems Civitas and the Norwegian Voting Protocol. Pret a Voter is described both in a real and an ideal case, and analysis of these cases regarding ...
    • Cryptographic Protocols from Lattice Assumptions 

      Berge, Guro Rio. (Bachelor thesis, 2022)
      Bachelor oppgåva vil introdusera to gitter-problem, learning with errors (LWE) and shortest integer solution (SIS), som sikkerheten til gitter-kryptografi baserer seg på. LWE og SIS var introdusert av henholdsvis Oded Regev ...
    • Cryptographic Schemes Based on Isogenies 

      Stolbunov, Anton (Doktoravhandlinger ved NTNU, 1503-8181; 2012:16, Doctoral thesis, 2012)
    • Cryptographic smooth neighbors 

      Bruno, Giacomo; Corte-Real Santos, Maria; Costello, Craig; Eriksen, Jonathan Komada; Meyer, Michael; Naehrig, Michael; Sterner, Bruno (Peer reviewed; Journal article, 2023)
      We revisit the problem of finding two consecutive B-smooth integers by giving an optimised implementation of the Conrey-Holmstrom-McLaughlin “smooth neighbors” algorithm. While this algorithm is not guaranteed to return ...