• Attacking pairing-free attribute-based encryption schemes 

      Herranz Sotoca, Javier (Institute of Electrical and Electronics Engineers (IEEE), 2020)
      Accés obert
      Combining several results that have been published in the last years, it is known that it is impossible to design simple and secure attribute-based encryption schemes that work in (classical) settings like the RSA or the ...
    • Códigos monomiales vistos como subespacios vectoriales invariantes 

      García Planas, María Isabel; Magret Planas, Maria dels Dolors; Um, Laurence Emilie (2015)
      Text en actes de congrés
      Accés obert
      Es bien sabido que los códigos cíclicos son muy útiles en aplicaciones en general y a los criptosistemas en particular, ya que no resultan costosos desde un punto de vista computacional, además estos códigos alcanzan la ...
    • Efficient cryptosystems from 2k-th power residue symbols 

      Herranz Sotoca, Javier; Libert, Benoit; Joye, Marc; Benhamouda, Fabrice (2017-04)
      Accés obert
      Goldwasser and Micali (J Comput Syst Sci 28(2):270–299, 1984) highlighted the importance of randomizing the plaintext for public-key encryption and introduced the notion of semantic security. They also realized a cryptosystem ...
    • Electromagnetic analysis attack against smart cards 

      Castells Màrquez, Xavier (Universitat Politècnica de Catalunya, 2008-02-08)
      Projecte Final de Màster Oficial
      Accés restringit per decisió de l'autor
      Smart cards were born as a secure and powerfully built device. The main feature smart cards introduce is that they process data in a safe way because they support the implementation of cryptographic algorithms based on ...
    • Encrypted and secure messages with CAN FD 

      Acosta Montilla, Alejandro (Universitat Politècnica de Catalunya, 2021-05-17)
      Projecte Final de Màster Oficial
      Accés obert
      The project intends to portray an approach to design a cryptographic secured way to transmit messages on the well-known CAN bus communication protocol in modern cars. However, due to the requirement of including some message ...
    • Network layer security and secret key authentication 

      Llovet Ureña, Marcel (Universitat Politècnica de Catalunya, 2015-07)
      Treball Final de Grau
      Accés obert
      Realitzat a/amb:   Fachhochschule Technikum Wien
      The goal of this project is to update Von Mann Young Rhee’s book, ‘Internet Security: Cryptographic Principles, Algorithms and Protocols’ which is about network layer security and secret key authentication. It is an extremely ...
    • Optical Data Encryption. Supplements 

      Millán Garcia-Varela, M. Sagrario; Pérez Cabré, Elisabet (Wiley-VCH, 2011)
      Capítol de llibre
      Accés restringit per política de l'editorial