• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Tamper-Resistant Arithmetic for Public-Key Cryptography

Gaubatz, Gunnar 01 March 2007 (has links)
Cryptographic hardware has found many uses in many ubiquitous and pervasive security devices with a small form factor, e.g. SIM cards, smart cards, electronic security tokens, and soon even RFIDs. With applications in banking, telecommunication, healthcare, e-commerce and entertainment, these devices use cryptography to provide security services like authentication, identification and confidentiality to the user. However, the widespread adoption of these devices into the mass market, and the lack of a physical security perimeter have increased the risk of theft, reverse engineering, and cloning. Despite the use of strong cryptographic algorithms, these devices often succumb to powerful side-channel attacks. These attacks provide a motivated third party with access to the inner workings of the device and therefore the opportunity to circumvent the protection of the cryptographic envelope. Apart from passive side-channel analysis, which has been the subject of intense research for over a decade, active tampering attacks like fault analysis have recently gained increased attention from the academic and industrial research community. In this dissertation we address the question of how to protect cryptographic devices against this kind of attacks. More specifically, we focus our attention on public key algorithms like elliptic curve cryptography and their underlying arithmetic structure. In our research we address challenges such as the cost of implementation, the level of protection, and the error model in an adversarial situation. The approaches that we investigated all apply concepts from coding theory, in particular the theory of cyclic codes. This seems intuitive, since both public key cryptography and cyclic codes share finite field arithmetic as a common foundation. The major contributions of our research are (a) a generalization of cyclic codes that allow embedding of finite fields into redundant rings under a ring homomorphism, (b) a new family of non-linear arithmetic residue codes with very high error detection probability, (c) a set of new low-cost arithmetic primitives for optimal extension field arithmetic based on robust codes, and (d) design techniques for tamper resilient finite state machines.
2

Um estudo sobre codigos corretores de erros sobre posets / A study on error-correting codes in poset spaces

Ritter, Donizete 12 August 2018 (has links)
Orientador: Marcelo Muniz Silva Alves / Dissertação (mestrado profissional) - Universidade Estadual de Campinas, Instituto de Matematica, Estatistica e Computação Cientifica / Made available in DSpace on 2018-08-12T16:23:24Z (GMT). No. of bitstreams: 1 Ritter_Donizete_M.pdf: 621556 bytes, checksum: 2bf0368b784f3a2be59ca3c2552f4908 (MD5) Previous issue date: 2009 / Resumo: Neste trabalho abordamos a teoria dos Códigos Corretores de Erros clássica e também os códigos sobre ordens parciais, com algumas comparações entre os dois casos. Enfocamos, particularmente, a definição de Alfabeto, a distância de Hamming, os códigos lineares e a definição de matriz geradora de um código; o estudo dos limitantes de Singleton e de Hamming, além de tratar dos Códigos de Hamming. Em relação aos Códigos em Conjuntos Parcialmente Ordenados, apresentamos a definição de ordens parciais, métricas sobre conjuntos ordenados, contagem dos elementos da "bola", resultados sobre Ideais e o Código de Hamming Estendido; estudamos o caso da ordem cadeia ("chain poset"), analisando os códigos de uma cadeia e os códigos de duas cadeias de mesmo comprimento e, por fim, nos dedicamos ao estudo das "Métricas POSET", que admitem códigos binários perfeitos de codi-mensão m, caracterizando assim os Códigos Posets m-corretores de erros. Nosso objetivo é apresentar um texto, acessível a alunos de graduação, que contemple a teoria básica dos Códigos Corretores de Erros, no entanto, forneça uma noção sobre os códigos sobre ordens parciais. / Abstract: In this work, we address the classical theory of error-correcting codes and the theory of codes over poset spaces, also known as poset codes, establishing comparisons between these two cases. In particular, we present the definition of alphabet, the Hamming distance, linear codes and the definition of a generating matrix for a linear code; we also present the Singleton and Hamming bounds, alongside with the Hamming codes. With respect to poset codes, we present the definitions of partial orders and of the poset metric, the counting of the number of elements in a ball in a poset space, some results on ideals in posets and the extended Hamming code; we study the chain poset case, analysing the cases of codes over a chain poset and codes over a union of two chains of the same length and, finally, we study the poset metrics that allow m-perfect binary codes of codimension m, thus characterizing these codes. Our aim is to present a text, accessible for undergraduates, that encompasses the basic theory of error-correcting codes and, nonetheless, also provides some notions on poset codes. / Mestrado / Teoria dos Erros / Mestre em Matemática

Page generated in 0.1274 seconds