Now showing items 1-9 of 9

    • Apply crytography to achieve optimality in a game-theoretic problem 

      Reza, Adnan; Mahmud, Akib; Sabrin, Shaila (BRAC University, 2014)
      We aim to use cryptography to solve a game-theoretic problem which is prevalent in the area of two party strategic games. The standard game-theoretic solutions concept for such games is that of a Nash equilibrium: a pair ...
    • Blockchain-based traffic surveillance footage authenticity detection system 

      Bin Moshiur, Tasnimul; Ullah, Mohammad Zafar; Nawar, Nahian; Tazwar, Tawsif Muhammed; Nanjiba, Rifah (Brac University, 2023-01)
      With the advancement in technology, fraudulent videos are becoming harder to de tect and easier to produce. Surveillance footage can serve as circumstantial evidence when dealing with crimes, however when this footage is ...
    • Creating a new Cryptographic algorithm using Collatz Conjecture 

      Rasheed, Shoumya Shuprabho; Remon, Rakibul Hasan; Labib, Monwar (Brac University, 2022-09)
      Owing to the increasing need for the security of information and data access, due to the steep increase in the rate at which there are more methods of breaking the existing algorithms, which primarily rely on a prime ...
    • Enhanced and secured hybrid steganography model for hiding large data 

      Majumder, Srabony; Tanu, Mohon Dash; Faisal, S. M. Fahim; Sristy, Mumtahinah Rahman; Paul, Rigan (Brac University, 2023-05)
      Recent works on steganography basically are focused on various network layers and multiple data-hiding techniques. These researches lead to image manipula- tion, contortion and small-scale payload. This paper proposes a ...
    • An investigation on implementations of theoretical whitebox cryptographic solutions 

      Eshan, Adnan Rahman; Kashfee, Jarin Tasnim Khan; Hasan, Md. Rabib; Islam, Mahmudul (Brac University, 2024-01)
      Whitebox Cryptography techniques are those which are aimed at protecting software implementations of cryptographic algorithms against key recovery in unprotected devices. The sensitive data embedded in the code is the ...
    • A multi-level random key cryptosystem based on DNA encoding and state-changing mealy machine 

      Taj, Towshik Anam (Brac University, 2023-02)
      Cryptography allows our data to be transmitted without giving sensitive information away. This is the art of hiding the information from the malicious third party and make the data accessible to only the sender and the ...
    • Physical currency or crypto currency, which one will be better for our economy? 

      Rohan, Raian Kibria; Raisa, Zeba (Brac University Research For Development Club (BURED), 2024-07-03)
      As the world transitions towards a cashless society, there is a growing debate on whether physical currency or cryptocurrency is better for the economy. While physical currency has been the traditional medium of exchange, ...
    • Review on cyclic group and affine cryptosystem and its application on cryptography 

      Tasnim, Samiha (BRAC University, 2018-09)
      In this thesis, I have tried to briefly describe the concept of cryptography and group theory and the relation between them. In short, Cryptography is regarded as a medium which enables communications to take place under ...
    • Secured Internet of Things (IoT) Model using Blockchain 

      Khan, Abdul Muneem; Oni, Fuad Hossain; Omar, Jabed; Noman, MD. Abdullah Al; Jamil, MD. Borhan Uz (Brac University, 2020-12)
      Anything which is connected to the internet is prone to threats. The internet has a saying that, ”There are two types of hacked devices. One which is hacked, and the other one is which does not know that it is hacked”. ...