The framework of the thesis outline:
The main body of the paper is written in chapters, and each chapter starts from another page. The title of each chapter should be focused and concise. The number of words is generally within 15, and punctuation is not allowed. The following is an example of a thesis outline:
Chapter 1
Thread theory
The repetition rate of this part should be between 40-60%, and the introduction (or introduction) should include: the academic background and theoretical and practical significance of this research topic; Literature review at home and abroad; The source and main research contents of this research topic. Learn to explain the research achievements and progress of domestic and foreign peers (including research institutions and scholars) in your own words, and it is best to find the existing problems.
The research background and significance of 1. 1 project.
Research status of 1.2 subliminal channel at home and abroad
Research status of 1.2. 1 subliminal channel abroad
1.2.2 Domestic Research Status of Subliminal Channels
1.3 problem and its research purpose
1.4 main research contents and innovations of the paper
1.5 paper organizational structure arrangement
chapter two
Subliminal channel in digital signature (related theoretical basis).
The repetition rate of this part of the text is kept below 60%
This part is mainly to write the main contents of relevant basic theories used in the follow-up research in my own words. If the repetition rate of words in this part is less than 40%, it can only show that you intend to reduce the repetition rate of plagiarism.
2. 1 Introduction to Digital Signature
2. 1. 1 Digital Signature Overview
2. 1.2 Basic theory of digital signature
2.2 Subliminal Channel Basic Theory
2.2. 1 subliminal channel concept
2.2.2 Simmons Prisoner problem?
2.2.3 General model of subliminal channel
2.2.4 Structure and classification of subliminal channels
2.2.5 Existence mechanism of subliminal channels
2.2.6 capacity of subliminal channel
2.3 Digital signature and subliminal channel
2.4 subliminal channel in elgamal digital signature scheme
2.4. 1 ElGamal signature algorithm
2.4.2 Broadband Sub-threshold Channel in Elgamal Signature
2.4.3 Narrow-band subliminal channel in Elgamal signature
2.5 subliminal channel in DSA digital signature scheme
2.5. 1 DSA signature algorithm
2.5.2 broadband subliminal channel in DSA
2.5.3 Narrow-band subthreshold channels in digital subtraction angiography
2.6 Overview of this chapter
chapter three
Research on subliminal channel communication in elliptic curve digital signature
This part is the first part of my own research and analysis, and the word repetition rate can be kept below 15%.
Of course, it is difficult to write this part without writing the first small paper. If you accept it? Related basic theory? Dealing with this chapter shows that your research content is too empty, don't graduate!
3. Basic description of1elliptic curve cryptosystem
3. Definition of1.1elliptic curve cryptosystem
3. 1.2 elliptic curve algorithm
3. 1.3 elliptic curve discrete logarithm problem
3. Performance analysis of1.4 elliptic curve cryptosystem
3.2 Elliptic curve signature algorithm description
3.2. 1 Select the safety elliptic curve
3.2.2 Elliptic curve signature algorithm
3.3 Sub-threshold channel in elliptic curve digital signature
3.3. Broadband Subthreshold Channel in1Elliptic Curve Digital Signature
3.3.2 Narrow-band Sub-threshold Channel in Elliptic Curve Digital Signature
3.4 Narrow-band Sub-threshold Channel Testing Based on MIRACL Large Numbers Library
3.4. 1 Method of constructing narrowband subliminal channel
3.4.2 Introducing Miracl large number library
testing environment
Description of test algorithm
3.5 Test Results and Analysis
3.6 Overview of this chapter
chapter four
Strong verifiable threshold subliminal channel scheme based on elliptic curve
This part is the second part of my own research and analysis, and the word repetition rate can be kept below 15%.
Of course, if you don't write the second essay, this part is very difficult to write. If you deal with this chapter with experimental results and analysis, it is obvious that your research content is not substantial and too weak!
4. 1 Introduction
4.2 Introduction of relevant schemes
4.2. 1 Chamil threshold scheme.
4.2.2 Pedersen verifiable secret sharing scheme
4.3 Construction of strong verifiable threshold sub-threshold channel scheme based on elliptic curve
4.3. 1 Parameter Selection of Elliptic Curve
4.3.2 Subconscious information generation stage
4.3.3 Signature Initialization Stage
4.3.4 Signature Generation Stage
4.3.5 Signature verification stage
4.3.6 subliminal information verification and extraction stage
.4 correctness analysis
4.5 Security Analysis
4.6 Overview of this chapter
chapter five
Scheme of closing the subliminal channel of ECDSA signature
This part is the third part of my own research and analysis, and the word repetition rate can be kept below 15%. Of course, it is difficult to write this part without writing the third essay.
5. 1 Overview of closed subthreshold channels
5.2 theoretical model of closed subthreshold channel
5.2. 1 Closed subthreshold channel model, where the fair party generates true random numbers.
5.2.2 Closed subliminal channel model with supervisor's participation
5.3 Several schemes of closing DSA subthreshold channel
5.3. 1 Closed Scheme Based on Commitment Shielding
5.3.2 Simmons' Closing Scheme
5.3.3 Closed Subthreshold Channel Scheme Based on Zero-knowledge Proof
5.3.4 Closed Scheme Based on Zero Knowledge Proof and Partition Selection
5.4 a new closed ECDSA subliminal channel scheme
5.4. 1 Scheme introduction
5.4.2 Security analysis of the scheme
5.4.3 Closed analysis of the scheme
5.5 Overview of this chapter
;