Now showing items 1-20 of 153

    • A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions 

      Cilardo, Alessandro; Esposito, Luigi; Veniero, Antonio; Mazzeo, Antonino; Beltran Querol, Vicenç; Ayguadé Parra, Eduard (2010)
      Conference report
      Restricted access - publisher's policy
      After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the ...
    • A new character-level encryption algorithm: how to implement cryptography in an ICT classroom 

      Arboledas Brihuega, David (OmniaScience, 2019-09)
      Article
      Open Access
      It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is ...
    • A new class of codes for fingerprinting schemes 

      Fernández Muñoz, Marcel; Soriano Ibáñez, Miguel; Cotrina Navau, Josep (Springer, 2005)
      Conference report
      Restricted access - publisher's policy
      In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by ...
    • A new countermeasure against side-channel attacks based on hardware-software co-design 

      Lumbiarres López, Rubén; López García, Mariano; Cantó Navarro, Enrique (2016-09-01)
      Article
      Open Access
      This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whose implementation is based on a hardware-software co-design. The hardware architecture consists of a microprocessor, which ...
    • A note about the traceability properties of linear codes 

      Fernández Muñoz, Marcel; Cotrina Navau, Josep; Soriano Ibáñez, Miguel; Domingo, Neus (Springer, 2007)
      Conference report
      Restricted access - publisher's policy
      We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c 2¿<¿n/(n¿-¿d). In this paper, we show that a less restrictive condition can ...
    • A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings 

      Parra Arnau, Javier; Rebollo Monedero, David; Forné Muñoz, Jorge (Springer, 2011)
      Conference report
      Restricted access - publisher's policy
      Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture ...
    • A secure communication design based on the chaotic logistic map: an experimental realization using Arduino microcontrollers 

      Zapateiro De La Hoz, Mauricio Fabian; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (Springer, 2015)
      Part of book or chapter of book
      Restricted access - publisher's policy
    • AAA 

      Navarro Morales, Lara (Factoria BCBL, 2011-05-02)
      Audiovisual
      Open Access
    • AAA Protocol. Autenticació, autorització i comptabilitat 

      Mengual, Ester (Factoria BCBL, 2012-05)
      Audiovisual
      Open Access
    • AAA: autenticación, autorización y accounting 

      Marín Vinuesa, Lara (2010-05-20)
      Audiovisual
      Open Access
    • AAA: autentificación, autoritzación y accounting 

      Toro Sánchez, Alberto Carlos (2010-12)
      Audiovisual
      Open Access
    • Advanced cryptographic techniques for building verifiable and transparent electronic voting protocols 

      Escala Ribas, Alex (Universitat Politècnica de Catalunya, 2017-07-21)
      Doctoral thesis
      Open Access
      Electronic voting presents many challenges due to its multiple security requirements. Some of the challenges are related to guaranteeing voters' privacy and system's transparency, which are hard to satisfy simultaneously. ...
    • An experimental realization of a chaos-based secure communication using arduino microcontrollers 

      Zapateiro De La Hoz, Mauricio Fabian; Acho Zuppa, Leonardo; Vidal Seguí, Yolanda (2015-08-27)
      Article
      Open Access
      Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. ...
    • Analisis de seguridad de la red TOR 

      Ballesteros Lopez, Ignacio (Universitat Politècnica de Catalunya, 2018-10-31)
      Bachelor thesis
      Open Access
      The TOR network aims at providing anonymity to those users of the Internet who do not want to reveal their identity when browsing specific contents. TOR is composed of a set of routers that make use of cryptography to apply ...
    • Analysis and Programming of Cryptographic systems based on Elliptic Curves 

      Martínez Gilabert, Diego (Universitat Politècnica de Catalunya, 2014-10)
      Bachelor thesis
      Open Access
      [ANGLÈS] The purpose of this project is to review the current state of cryptographic systems, focusing in signatures schemes based on elliptic curves (such as Blind Signature, Aggregate Signature or Multisignature) and to ...
    • Anàlisi de dades i predicció pel trading de criptomonedes 

      Ribas Nicolau, Roger (Universitat Politècnica de Catalunya, 2017)
      Bachelor thesis
      Open Access
      Aquest projecte es planteja com a un exercici per part de l'autor en aprofundir en el coneixement de les eines existents que s'utilitzen en l'àmbit de generar prediccions a partir de dades, concretament en dades en forma ...
    • Anàlisi d’algorismes criptogràfics per a dispositius mòbils 

      Vila Canals, Joan (Universitat Politècnica de Catalunya, 2007-07-05)
      Master thesis (pre-Bologna period)
      Open Access
      En aquest projecte s’estudien els costos d’execució d’algorismes criptogràfics a dispositius de mà com poden ser les agendes electròniques. L’objectiu final d’aquest estudi és determinar quins algoritmes són millors per ...
    • Análisis del posible uso del Broadcast Encryption en la televisión de pago 

      Ferrer Aguilar, Javier (Universitat Politècnica de Catalunya, 2009-05-06)
      Master thesis (pre-Bologna period)
      Open Access
      Este proyecto se pretende realizar un estudio de los sistemas de difusión de televisión de pago que hay en funcionamiento actualmente y en la medida de lo posible, proponer un nuevo sistema que haga uso de los esquemas ...
    • Aplicaciones de los métodos criptográficos 

      Gonzalo Díaz, Raúl (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 1996)
      Article
      Open Access
    • Ataque diferencial mediante inyección de un error en AES-128 

      Trayno, Vladlena (Universitat Politècnica de Catalunya, 2016)
      Master thesis (pre-Bologna period)
      Open Access
      This project has studied and analized an attack by injection of errors against the AES encryption scheme currently existing in literature. The AES symmetric cryptosystem is perhaps the most widely used today. The idea of ...