Cryptographic
Mostrando 1-12 de 27 artigos, teses e dissertações.
-
1. La memoria resiliente y la amnesia criptográfica: el caso de la juventud empobrecida latinoamericana
Abstract How is it possible such degree that social violence is exerted on young people, existing at the same time structural unemployment and worrying dropout rates? Moreover, how these factors affect the construction of the social network? This paper attempts to answer some of these questions. The concept of cryptographic memory is introduced to understand
Saude soc.. Publicado em: 2017-06
-
2. Implementação em software de algoritmos de resumo criptográfico / Software implementation of cryptographic hash algorithms
Os algoritmos de resumo criptográfico são uma importante ferramenta usada em muitas aplicações para o processamento seguro e eficiente de informações. Na década de 2000, sérias vulnerabilidades encontradas em funções de resumo tradicionais, como o SHA-1 e o MD5, levou a comunidade a repensar o desenvolvimento da criptanálise destes algoritmos e pr
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 16/06/2011
-
3. ARQUITETURAS DE CRIPTOGRAFIA DE CHAVE PÚBLICA: ANÁLISE DE DESEMPENHO E ROBUSTEZ / PUBLIC-KEY CRYPTOGRAPHY ARCHITECTURES: PERFORMANCE AND ROBUSTNESS EVALUATION
Given the evolution of the data communication field, and the resulting increase of the information flow in data, networks security became a major concern. Modern cryptographic methods are mathematically reliable. However their implementation in hardware leaks confidential information through side-channels like power consumption and electromagnetic emissions.
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 15/04/2011
-
4. Método Criptográco Baseado em Autômatos Celulares Bidimensionais para Cifragem de Imagens
This work proposes a new symmetric-key cryptographical model based on von Neumann two-dimensional, heterogeneous and non-additive cellular automata. The encryption process is performed by calculating consecutive pre-images and decryption process by the forward evolution of cellular automata. The proposed model was based on earlier work which used one-dimensi
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 08/12/2010
-
5. Algoritmos de autenticação de mensagens para redes de sensores. / Message authentication algorithms for wireless sensor networks.
Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and (specially) energy hinders the deployment of many modern cryptographic algorithms known to be secure. This
Publicado em: 2010
-
6. O problema da dedução do intruso para um protocolo criptográfico especificado via reescrita módulo AC / O problema da dedução do intruso para um protocolo criptográfico especificado via reescrita módulo AC
O ponto inicial deste trabalho é um caso de estudo de um protocolo de carteira eletrônica modelado por uma teoria equacional de um fragmento da aritmética, que inclui exponenciação. Foi estudado um procedimento de decisão para o problema da dedução do intruso, proposto recentemente por Bursuc, Comon-Lundh e Delaune. O intruso tem as mesmas capacidade
Publicado em: 2009
-
7. Segurança para o sistema brasileiro de televisão digital: contribuições à proteção de direitos autorais e à autenticação de aplicativos. / Security on brazilian digital television system: contributions to the digital rights protection and to applications authentication.
In Brazil, the television system is considered an important source of communication and entertainment. The Brazilian digital transmissions started on December 2007 and first offered functionalities were the high definition, mobility and portability. In a later moment other functionalities will be added: multiprogramming (more than one service per channel) an
Publicado em: 2009
-
8. Verificação formal de protocolos criptográficos : o caso dos protocolos em cascata
Ensuring the security of cryptographic protocols is not a simple task. The Dolev-Yao model, proposed in the early 80s, is an important mathematical modeling method of cryptographic protocols, enabling the analysis and verification of the safety of these protocols. But the analytical verification does not guarantee that implementations are not error-prone. In
Publicado em: 2008
-
9. Uma proposta de um sistema criptografico de chave publica utilizando codigos convolucionais classicos e quanticos / A proposal of a cryptographic system of public key using classical and quantum convolutional codes
The proposal of a cryptographic system of public key that uses classical and quantum convolutional codes of unit-memory presented in this work, is based on the use of trapdoors functions which when applied to submatrices reduce the capacity of correction of errors of the code. This process gives us an increase in the degree of privacy of information being se
Publicado em: 2008
-
10. Cryptographic algorithms for sensor networks. / Algoritmos criptográficos para redes de sensores.
The need for security is a great concern in any modern network. However, networks that are highly dependent of constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and (more importantly) energy hinders the deployment of many important cryptographic algorithms known
Publicado em: 2008
-
11. Criptografia quântica em redes de informação crítica - aplicação a telecomunicações aeronáuticas. / Quantum cryptography in critical information networks - application to aeronautical telecommunications.
The importance of security maintenance in critical information networks has been rising in recent times. Over the past decades, the utilization of cryptography tools, mainly those based on computationally intractable problems, was enough to ensure the security of communications systems. The development of the new information processing technique known as qua
Publicado em: 2008
-
12. A new cryptography method based on the pre-image calculus of chaotic, non-homogeneous and non-additive cellular automata / Um novo método criptográfico baseado no cálculo de pré-imagens de autômatos celulares caóticos, não-homogêneos e não-aditivos
A new cryptographic method based on cellular automata (CA) has been investigated. In this method, the ciphering process is performed by preimages computation while deciphering is performed by CA temporal evolution. The preimages calculus is able to be used in a cryptographic system only if any arbitrary CA lattice has at least one preimage. In a previous met
Publicado em: 2007