Exploració per tema "Criptografia"
Ara es mostren els items 1-20 de 219
-
A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions
(2010)
Text en actes de congrés
Accés restringit per política de l'editorialAfter some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the ... -
A control plane for WireGuard
(Institute of Electrical and Electronics Engineers (IEEE), 2021)
Text en actes de congrés
Accés obertWireGuard is a VPN protocol that has gained significant interest recently. Its main advantages are: (i) simple configuration (via pre-shared SSH-like public keys), (ii) mobility support, (iii) reduced codebase to ease ... -
A Decentralized, Secure and Censorship Resistant Governance Protocol on Ethereum
(Universitat Politècnica de Catalunya, 2022-07-06)
Treball Final de Grau
Accés obertDecentralized governance system on Ethereum implemented with a unique identification system of using the ERC721 standard. -
A new character-level encryption algorithm: how to implement cryptography in an ICT classroom
(OmniaScience, 2019-09)
Article
Accés obertIt is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is ... -
A new class of codes for fingerprinting schemes
(Springer, 2005)
Text en actes de congrés
Accés restringit per política de l'editorialIn this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ... -
A new countermeasure against side-channel attacks based on hardware-software co-design
(2016-09-01)
Article
Accés obertThis paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design. The hardware architecture consists of a microprocessor, which ... -
A note about the traceability properties of linear codes
(Springer, 2007)
Text en actes de congrés
Accés restringit per política de l'editorialWe characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ... -
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
(Springer, 2011)
Text en actes de congrés
Accés restringit per política de l'editorialRecommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ... -
A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers
(Springer, 2015)
Capítol de llibre
Accés restringit per política de l'editorial -
AAA
(Factoria BCBL, 2011-05-02)
Audiovisual
Accés obert -
AAA Protocol. Autenticació, autorització i comptabilitat
(Factoria BCBL, 2012-05)
Audiovisual
Accés obert -
AAA: autenticación, autorización y accounting
(2010-05-20)
Audiovisual
Accés obert -
AAA: autentificación, autoritzación y accounting
(2010-12)
Audiovisual
Accés obert -
Accelerating zero knowledge proofs
(Universitat Politècnica de Catalunya, 2023-10-19)
Treball Final de Grau
Accés obert
Realitzat a/amb: Massachusetts Institute of Technology / Massachusetts Institute of TechnologyLes proves de coneixement zero són una eina criptogràfica altament prometedora que permet demostrar que un predicat és correcte sense revelar informació addicional sobre aquest. Aquestes tipus de proves són útils en ... -
Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols
(Universitat Politècnica de Catalunya, 2017-07-21)
Tesi
Accés obertElectronic voting presents many challenges due to its multiple security requirements. Some of the challenges are related to guaranteeing voters' privacy and system's transparency, which are hard to satisfy simultaneously. ... -
An experimental realization of a chaos-based secure communication using arduino microcontrollers
(2015-08-27)
Article
Accés obertSecurity and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. ... -
Analisis de seguridad de la red TOR
(Universitat Politècnica de Catalunya, 2018-10-31)
Treball Final de Grau
Accés obertThe TOR network aims at providing anonymity to those users of the Internet who do not want to reveal their identity when browsing specific contents. TOR is composed of a set of routers that make use of cryptography to apply ... -
Analysis and Programming of Cryptographic systems based on Elliptic Curves
(Universitat Politècnica de Catalunya, 2014-10)
Treball Final de Grau
Accés obert[ANGLÈS] The purpose of this project is to review the current state of cryptographic systems, focusing in signatures schemes based on elliptic curves (such as Blind Signature, Aggregate Signature or Multisignature) and to ... -
Analyzing the limits of deep learning applied to side channel attacks
(Universitat Politècnica de Catalunya, 2022-06)
Treball Final de Grau
Accés obertSociety is advancing by leaps and bounds in terms of technology in recent decades. These advances come with new products and services, which are generally designed within a few years, and potentially without undergoing ... -
Anàlisi de dades i predicció pel trading de criptomonedes
(Universitat Politècnica de Catalunya, 2017)
Treball Final de Grau
Accés restringit per decisió de l'autorAquest projecte es planteja com a un exercici per part de l'autor en aprofundir en el coneixement de les eines existents que s'utilitzen en l'àmbit de generar prediccions a partir de dades, concretament en dades en forma ...