Algorithm Cryptography
Mostrando 1-12 de 12 artigos, teses e dissertações.
-
1. ARQUITETURAS DE CRIPTOGRAFIA DE CHAVE PÚBLICA: ANÁLISE DE DESEMPENHO E ROBUSTEZ / PUBLIC-KEY CRYPTOGRAPHY ARCHITECTURES: PERFORMANCE AND ROBUSTNESS EVALUATION
Given the evolution of the data communication field, and the resulting increase of the information flow in data, networks security became a major concern. Modern cryptographic methods are mathematically reliable. However their implementation in hardware leaks confidential information through side-channels like power consumption and electromagnetic emissions.
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 15/04/2011
-
2. Algoritmos de autenticação de mensagens para redes de sensores. / Message authentication algorithms for wireless sensor networks.
Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and (specially) energy hinders the deployment of many modern cryptographic algorithms known to be secure. This
Publicado em: 2010
-
3. Sobre codigos hermitianos generalizados / On generalized hermitian codes
We study Goppa codes (GH codes) based on certain algebraic function fields whose number of rational places is large. These codes generalize the well-known Hermitian codes; thus we might expect that they have good parameters. Bulygin (IEEE Trans. Inform. Theory 52 (10), 46644669 (2006)) initiate the study of GH-codes; while he considered only the even chara
Publicado em: 2008
-
4. Uncertainty-based key agreement protocol.
This work introduces a new encryption algorithm. The main motivation to the suggested algorithm is to attempt to open new ways and alternative visions that may be eventually integrated into well established cryptography algorithms being used today. When RSA, DES, and several other algorithms are compared, at least a common and central point can be identified
Publicado em: 2007
-
5. Um algoritmo de criptografia de chave pública semanticamente seguro baseado em curvas elípticas / A semantically secure public key algorithm based on elliptic curves
Esta dissertação apresenta o desenvolvimento de um novo algoritmo de criptografia de chave pública. Este algoritmo apresenta duas características que o tornam único, e que foram tomadas como guia para a sua concepção. A primeira característica é que ele é semanticamente seguro. Isto significa que nenhum adversário limitado polinomialmente consegue
Publicado em: 2007
-
6. Grupos pseudo-livres, primos seguros e criptografia RSA
When a cryptographic scheme is defined over a group, encrypting messages is equivalent to assigning values in this group to variables of some equation, whereas breaking this scheme is âto discoverâ which values were assigned to those variables. Therefore, the security of such schemes is connected to the hardness to solve equations over groups. The use of f
Publicado em: 2007
-
7. Study and implementation of cryptographic hash algorithms on the Intel XScale platform / Estudo e implementação de algoritmos de resumo (hash) criptografico na plataforma Intel MARCA REGISTRADA XScale
Nos últimos anos, a quantidade de dispositivos móveis tem crescido dramaticamente assim como a complexidade das aplicações que os usuários desejam executar neles. Ao mesmo tempo, a preocupação com a segurança do grande público também tem aumentado, criando uma demanda maior por aplicações criptográficas, como assinaturas digitais, que dependem d
Publicado em: 2006
-
8. Impacto da utilizaÃÃo de mecanismos de seguranÃa em redes de sensores sem fio
As Redes de Sensores Sem Fio estÃo sendo aplicadas em uma larga faixa de aplicaÃÃes como monitoramento ambiental, rastreamento de objetos, biomedicina e sistemas militares. Elas sÃo compostas de pequenos dispositivos computacionais com habilidades de intercomunicaÃÃo e monitoramento do ambiente. Como em qualquer sistema de informaÃÃo, encontramos a n
Publicado em: 2005
-
9. Secure and Low Cost Virtual Connection Under Linux / Conectividade virtual segura e de baixo custo sob Linux
The business environment requires constant collaboration, between people and offices geographically spreaded. The corporative market has one more option for real time data transmission: the private network communications based on IP protocol. The VPN Virtual Private Network stands for the most suitable solution to reduction of costs, fundamental for small co
Publicado em: 2003
-
10. SECCODES - Secure Communication Development System.
In the history of telecommunications, there has been no single piece of terminal equipment so widely used as the telephone. In many parts of the world, the characteristics of being simple to operate, cheap to purchase and inexpensive to use, and the freedom to access almost any other terminal across the globe, have made the fixed line telephone a basic need
Publicado em: 2003
-
11. Co-processador para algoritmos de criptografia assimetrica
This work has as main objective the development of a co-processor for asymmetric cryptography algorithms. It is a co-processor that can serve for the implementation of asymmetríc cryptography algorithms. It isn t a devíce dedicated to only a cryptographic algorithm. So, it uses a library of hardware modules that implement basic routines useful to several o
Publicado em: 2002
-
12. SECURITY PROTOCOLS IN NETWORKS OF COMPUTERS / PROTOCOLOS DE SEGURANÇA EM REDES DE COMPUTADORES
This work analyses several algoritms of cryptography; among them, the DES (Data Encryption Standard), the public key algorithm RSA and the public key distribution algorithm DH of Diffie-Hellman. Three security protocols are then proposed for interactive and one-way communication in packet switched networks. The sirst protocol was proposed with the assumption
Publicado em: 1982