• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • Tagged with
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Do julgamento à justiça : determinantes da implementação de medidas do Sistema Interamericano de Direitos Humanos pelo Estado brasileiro

Cardoso, Helvisney dos Reis 19 July 2016 (has links)
Dissertação (mestrado)—Universidade de Brasília, Instituto de Relações Internacionais, 2016. / Submitted by Fernanda Percia França (fernandafranca@bce.unb.br) on 2016-09-20T16:13:58Z No. of bitstreams: 1 2016_HelvisneydosReisCardoso.pdf: 4547951 bytes, checksum: 728b6e2eb8192ca8da1f82b614223813 (MD5) / Approved for entry into archive by Ruthléa Nascimento(ruthleanascimento@bce.unb.br) on 2016-10-03T17:18:52Z (GMT) No. of bitstreams: 1 2016_HelvisneydosReisCardoso.pdf: 4547951 bytes, checksum: 728b6e2eb8192ca8da1f82b614223813 (MD5) / Made available in DSpace on 2016-10-03T17:18:52Z (GMT). No. of bitstreams: 1 2016_HelvisneydosReisCardoso.pdf: 4547951 bytes, checksum: 728b6e2eb8192ca8da1f82b614223813 (MD5) / Este é um estudo das determinantes que afetam o processo de tomada de decisão no que se refere ao cumprimento das resoluções e recomendações do Sistema Interamericano de Direitos Humanos (SIDH) pelo Governo brasileiro (state compliance) entre 1988 e 2014. Utilizou-se compliance como uma variável contínua neste trabalho, explorando o meio termo do cumprimento parcial. Almejou-se produzir uma análise de política governamental que leve em conta todos os aspectos importantes de um processo de decisão. Buscou-se também coletar, consolidar e sistematizar dados empíricos sobre as principais determinantes que afetam o cumprimento dos instrumentos do SIDH pelo Brasil. A partir de uma abordagem que se centrou na compliance como um fator engendrado pela política doméstica dos Estados e nos fatores internos pré-existentes que levam os Estados a se comportarem de acordo com normas internacionais, testei hipóteses sobre como a existência de políticas públicas do Estado referentes às medidas específicas proferidas pelo SIDH, assim como a própria violação de direitos humanos decorrente de uma agenda de política pública do Estado e a dependência de poderes autônomos, como governos locais, Ministério Público e Judiciário, afetam o grau de compliance do Estado brasileiro. Buscou-se, assim, colocar em questão algumas concepções das principais teorias da literatura especializada. _______________________________________________________________________________________________ ABSTRACT / This is a study of the determinants that affect the decision-making process regarding the state compliance with resolutions and recommendations of the Inter-American System of Human Rights (ISHR) by the Brazilian government between 1988 and 2014. Compliance is used as a continuum in this research, exploring the partial term of the concept. It aims at producing a governmental policy analysis that takes into account all important aspects of a decision process and that also collects, consolidates and systematizes empirical data to observe the main determinants that affect the Brazilian compliance with the ISHR’ instruments. Using an approach based on compliance resulting from domestic politics and from pre-existing internal factors that lead States to behave in accordance with international rules, assumptions will be tested on how the existence of a public policy agenda specifically addressing the remedies issued by the ISHR, as well as the dependence of autonomous powers, as local governments, prosecutors and judiciary power, and violations that arise from state policy agendas affect the Brazilian degree of compliance with the ISHR’ instruments. Hence, this study seeks to question concepts of the main specialized theory.
2

Performance and Comparison of post-quantum Cryptographic Algorithms / Prestanda och jämförelse av kvantresistenta kryptoalgoritmer

Valyukh, Vladimir January 2017 (has links)
Secure and reliable communication have always been critical part of todays infrastructure. Various asymmetric encryption schemes, such as RSA, have been used to achieve this goal. However, with advancements in quantum computing, current encryption schemes are becoming more vulnerable since they are weak to certain quantum attacks, such as Shor’s Algorithm. Therefore demand for post-quantum cryptography (PQC), which is not vulnerable to quantum attacks, is apparent. This work’s goal is to evaluate and compare PQC algorithms.
3

Advances Towards Practical Implementations of Isogeny Based Signatures

Gorrie, Robert W.V. January 2019 (has links)
Progress in the field of quantum computing has shown that, should construction of a sufficiently powerful quantum computer become feasible, much of the cryptography used on the Internet today will be rendered insecure. In lieu of this, several approaches to “quantum-safe” cryptography have been proposed, each one becoming a serious field of study. The youngest of these approaches, isogeny based cryptography, is oriented around problems in algebraic geometry involving a particular variety of elliptic curves. Supersingular isogeny Diffie-Hellman (SIDH) is this subfields main contender for quantum-safe key-exchange. Yoo et al. have provided an isogeny-based signature scheme built on top of SIDH. Currently, cryptographic algorithms in this class are hindered by poor performance metrics and, in the case of the Yoo et al. signature scheme, large communication overhead. In this dissertation we explore two different modifications to the implementation of this signature scheme; one with the intent of improving temporal performance, and another with the intent of reducing signature sizes. We show that our first modification, a mechanism for batching together expensive operations, can offer roughly 8% faster signature signing and verification. Our second modification, an adaptation of the SIDH public key compression technique outlined in [CJL + 17], can reduce Yoo et al. signature sizes from roughly 688λ bytes to 544λ bytes at the 128-bit security level on a 64-bit operating system. We also explore the combination of these techniques, and the potential of employing these techniques in different application settings. Our experiments reveal that isogeny based cryptosystems still have much potential for improved performance metrics. While some practitioners may believe isogeny-based cryptosystems impractical, we show that these systems still have room for improvement, and with continued research can be made more efficient - and eventually practical. Achieving more efficient implementations for quantum-safe algorithms will allow us to make them more accessible. With faster and lower-overhead implementations these primitives can be run on low bandwidth, low spec devices; ensuring that more and more machines can be made resistant to quantum cryptanalysis. / Thesis / Master of Science (MSc)

Page generated in 0.0199 seconds