Public Key Cryptography
Mostrando 1-11 de 11 artigos, teses e dissertações.
-
1. Implementação eficiente em software de curvas elípticas e emparelhamentos bilineares / Efficient software implementation of elliptic curves and bilinear pairings
O advento da criptografia assimétrica ou de chave pública possibilitou a aplicação de criptografia em novos cenários, como assinaturas digitais e comércio eletrônico, tornando-a componente vital para o fornecimento de confidencialidade e autenticação em meios de comunicação. Dentre os métodos mais eficientes de criptografia assimétrica, a cripto
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 26/08/2011
-
2. ARQUITETURAS DE CRIPTOGRAFIA DE CHAVE PÚBLICA: ANÁLISE DE DESEMPENHO E ROBUSTEZ / PUBLIC-KEY CRYPTOGRAPHY ARCHITECTURES: PERFORMANCE AND ROBUSTNESS EVALUATION
Given the evolution of the data communication field, and the resulting increase of the information flow in data, networks security became a major concern. Modern cryptographic methods are mathematically reliable. However their implementation in hardware leaks confidential information through side-channels like power consumption and electromagnetic emissions.
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 15/04/2011
-
3. Um estudo sobre a implementação de criptossistemas baseados em emparelhamentos bilineares sobre curvas elípticas em cartões inteligentes de oito bits / A study about implementation of elliptic curve pairing based cryptosystems in 8-bit smart cards
Emparelhamentos bilineares sobre curvas elípticas são funções matemáticas que viabilizam o desenvolvimento de uma série de novos protocolos criptográficos, entre eles, os criptossistemas baseados em identidades. Esses criptossistemas representam uma nova forma de se implementar criptografia de chaves públicas na qual são atenuadas ou completamente r
Publicado em: 2010
-
4. Middleware seguro para redes de sensores sem fio
There is a variety of application scenarios in wireless sensor networks such as medical monitoring, military, home and office security, agriculture and so on. These applications deal with Wireless Sensor Networks (WSNs) odd particularities such as limited power and computational capacities, hardware heterogeneity, low bandwidth, dynamic topology and scalabil
Publicado em: 2009
-
5. Name service and routing for traffic anonymizing networks / Serviço de nomes e roteamento para redes de anonimização de trafego
In several scenarios, iti s desirable to protect not only the content of a communication, but the identities of its participants. To satisfy this property, different techniques from those used to support confidentiality and authentication are commonly required. In this work, the problem of anonymous communication on the Internet is explored through the desig
Publicado em: 2007
-
6. Um algoritmo de criptografia de chave pública semanticamente seguro baseado em curvas elípticas / A semantically secure public key algorithm based on elliptic curves
Esta dissertação apresenta o desenvolvimento de um novo algoritmo de criptografia de chave pública. Este algoritmo apresenta duas características que o tornam único, e que foram tomadas como guia para a sua concepção. A primeira característica é que ele é semanticamente seguro. Isto significa que nenhum adversário limitado polinomialmente consegue
Publicado em: 2007
-
7. "Proposal for encryption and signature schemes under certificateless public key cryptography model" / "Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de chave pública sem certificado"
Under the model of Identity Based Cryptography (ID-PKC), the public key can be the user s identity, therefore it does not require a Public Key Infrastructure (PKI) with its complex management of Digital Certificates. On the other hand, this system requires a Private Key Generator (PKG), a trusted authority who is in possession of a master key and can generat
Publicado em: 2006
-
8. Infra-estrutura de chaves públicas brasileira (ICP - BRASIL) e a formação do estado eletrônico
Why did an electronic government arise in Brazil? Looking for answering this question, a case study approach was applied. This research belongs to Science and Technology Sociology field and, in this perspective I examined which technology had appeared most in Brazilian electronic government regulation. Then, I came across Brazilian Public Key Infrastructure
Publicado em: 2006
-
9. CriptoanÃlise Diferencial
Since the creation of the standard of encryption of data DES (Data Encryption Standard) in 1978, iterative ciphers of based private key in nets of Feistel have been constructed, aiming at to increase the security of the information stored and transmitted in unsafe environments of communications. Such ciphers, besides in general presenting one high level of r
Publicado em: 2003
-
10. Secure and Low Cost Virtual Connection Under Linux / Conectividade virtual segura e de baixo custo sob Linux
The business environment requires constant collaboration, between people and offices geographically spreaded. The corporative market has one more option for real time data transmission: the private network communications based on IP protocol. The VPN Virtual Private Network stands for the most suitable solution to reduction of costs, fundamental for small co
Publicado em: 2003
-
11. SECURITY PROTOCOLS IN NETWORKS OF COMPUTERS / PROTOCOLOS DE SEGURANÇA EM REDES DE COMPUTADORES
This work analyses several algoritms of cryptography; among them, the DES (Data Encryption Standard), the public key algorithm RSA and the public key distribution algorithm DH of Diffie-Hellman. Three security protocols are then proposed for interactive and one-way communication in packet switched networks. The sirst protocol was proposed with the assumption
Publicado em: 1982