Ara es mostren els items 1-20 de 193

    • A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions 

      Cilardo, Alessandro; Esposito, Luigi; Veniero, Antonio; Mazzeo, Antonino; Beltran Querol, Vicenç; Ayguadé Parra, Eduard (2010)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the ...
    • A construction of traceability set systems with polynomial tracing algorithm 

      Egorova, Elena; Fernández Muñoz, Marcel; Kabatiansky, Grigory (Institute of Electrical and Electronics Engineers (IEEE), 2019)
      Text en actes de congrés
      Accés obert
      A family F of w-subsets of a finite set X is called a set system with the identifiable parent property if for any w-subset contained in the union of some t sets, called traitors, of F at least one of these sets can be ...
    • A Decentralized, Secure and Censorship Resistant Governance Protocol on Ethereum 

      Rodríguez Setó, Oriol (Universitat Politècnica de Catalunya, 2022-07-06)
      Treball Final de Grau
      Accés obert
      Decentralized governance system on Ethereum implemented with a unique identification system of using the ERC721 standard.
    • A new character-level encryption algorithm: how to implement cryptography in an ICT classroom 

      Arboledas Brihuega, David (OmniaScience, 2019-09)
      Article
      Accés obert
      It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is ...
    • A new class of codes for fingerprinting schemes 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
    • A new countermeasure against side-channel attacks based on hardware-software co-design 

      Lumbiarres López, Rubén; López García, Mariano; Cantó Navarro, Enrique (2016-09-01)
      Article
      Accés obert
      This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design. The hardware architecture consists of a microprocessor, which ...
    • A note about the traceability properties of linear codes 

      Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
    • A probabilistic concept of accessibility for access structures 

      Amer Ramon, Rafael; Giménez Pradales, José Miguel; Magaña Nieto, Antonio (2008-06-13)
      Report de recerca
      Accés obert
      In this paper we introduce the concept of weighted accessibility for access structures. In some sense, it represents a measure of how difficult or how easy is to recover the secret. We give also a numerical measure of ...
    • A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers 

      Zapateiro De La Hoz, Mauricio Fabian; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (Springer, 2015)
      Capítol de llibre
      Accés restringit per política de l'editorial
    • A study on data deduplication in HPC storage systems 

      Meister, Dirk; Kaiser, Jürgen; Brinkmann, Andre; Cortés, Toni; Kuhn, Michael; Kunkel, Julian (Institute of Electrical and Electronics Engineers (IEEE), 2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Deduplication is a storage saving technique that is highly successful in enterprise backup environments. On a file system, a single data block might be stored multiple times across different files, for example, multiple ...
    • AAA 

      Navarro Morales, Lara (Factoria BCBL, 2011-05-02)
      Audiovisual
      Accés obert
    • AAA Protocol. Autenticació, autorització i comptabilitat 

      Mengual, Ester (Factoria BCBL, 2012-05)
      Audiovisual
      Accés obert
    • AAA: autenticación, autorización y accounting 

      Marín Vinuesa, Lara (2010-05-20)
      Audiovisual
      Accés obert
    • AAA: autentificación, autoritzación y accounting 

      Toro Sánchez, Alberto Carlos (2010-12)
      Audiovisual
      Accés obert
    • Accelerating zero knowledge proofs 

      Pujol Ventosa, Laia (Universitat Politècnica de Catalunya, 2023-10-19)
      Treball Final de Grau
      Accés obert
      Realitzat a/amb:   Massachusetts Institute of Technology / Massachusetts Institute of Technology
      Les proves de coneixement zero són una eina criptogràfica altament prometedora que permet demostrar que un predicat és correcte sense revelar informació addicional sobre aquest. Aquestes tipus de proves són útils en ...
    • Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols 

      Escala Ribas, Alex (Universitat Politècnica de Catalunya, 2017-07-21)
      Tesi
      Accés obert
      Electronic voting presents many challenges due to its multiple security requirements. Some of the challenges are related to guaranteeing voters' privacy and system's transparency, which are hard to satisfy simultaneously. ...
    • An experimental realization of a chaos-based secure communication using arduino microcontrollers 

      Zapateiro De La Hoz, Mauricio Fabian; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (2015-08-27)
      Article
      Accés obert
      Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. ...
    • Analisis de seguridad de la red TOR 

      Ballesteros Lopez, Ignacio (Universitat Politècnica de Catalunya, 2018-10-31)
      Treball Final de Grau
      Accés obert
      The TOR network aims at providing anonymity to those users of the Internet who do not want to reveal their identity when browsing specific contents. TOR is composed of a set of routers that make use of cryptography to apply ...
    • Analysis and Programming of Cryptographic systems based on Elliptic Curves 

      Martínez Gilabert, Diego (Universitat Politècnica de Catalunya, 2014-10)
      Treball Final de Grau
      Accés obert
      [ANGLÈS] The purpose of this project is to review the current state of cryptographic systems, focusing in signatures schemes based on elliptic curves (such as Blind Signature, Aggregate Signature or Multisignature) and to ...
    • Analyzing the limits of deep learning applied to side channel attacks 

      Fernández Ortiz, Cristian (Universitat Politècnica de Catalunya, 2022-06)
      Treball Final de Grau
      Accés obert
      Society is advancing by leaps and bounds in terms of technology in recent decades. These advances come with new products and services, which are generally designed within a few years, and potentially without undergoing ...