{"id":131519,"date":"1996-01-01T00:00:00","date_gmt":"1996-01-01T00:00:00","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/contribucion-al-diseno-y-evaluacion-de-cifradores-en-flujo-para-comunicaciones-seguras\/"},"modified":"1996-01-01T00:00:00","modified_gmt":"1996-01-01T00:00:00","slug":"contribucion-al-diseno-y-evaluacion-de-cifradores-en-flujo-para-comunicaciones-seguras","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/ciencias-tecnologicas\/contribucion-al-diseno-y-evaluacion-de-cifradores-en-flujo-para-comunicaciones-seguras\/","title":{"rendered":"Contribucion al dise\u00f1o y evaluacion de cifradores en flujo para comunicaciones seguras."},"content":{"rendered":"<h2>Tesis doctoral de <strong> Miguel Soriano Ib\u00e1\u00f1ez <\/strong><\/h2>\n<p>El trabajo realizado en esta tesis consiste en el estudio del comportamiento de estructuras tipicas utilizadas como generadores pseudoaleatorios para su utilizacion en aplicaciones criptograficas, asi como el dise\u00f1o de un generador propio con buenas prestaciones criptograficas con aplicaciones en distintos entornos. Los esquemas clasicos de cifrado en flujo utilizan una funcion fs (funcion de realimentacion o de estado siguiente) lineal, de modo que hay un compromiso entre la estabilidad de la complejidad lineal de dichas secuencias y su inmunidad a ataques de correlacion de orden n. Analizando este inconveniente, se proponen estructuras que utilizan funciones no lineales de realimentacion, y se compararan con las existentes. Ademas se estudia y evalua su posible aplicacion en redes de banda ancha, comunicaciones moviles y en la generacion de secuencias ortogonales aplicables a las tecnicas de cdma. El generador propuesto, ademas de presentar un buen comportamiento estadistico, posee una arquitectura modular y escalable, de modo que se puede dimensionar a las necesidades criptograficas de las aplicaciones que lo requieran.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Contribucion al dise\u00f1o y evaluacion de cifradores en flujo para comunicaciones seguras.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Contribucion al dise\u00f1o y evaluacion de cifradores en flujo para comunicaciones seguras. <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Miguel Soriano Ib\u00e1\u00f1ez <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Polit\u00e9cnica de catalunya<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 01\/01\/1996<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Jos\u00e9 Luis Mel\u00fas Moreno<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Santos Gonzalez Gimenez <\/li>\n<li>Amparo Fuster Sabate (vocal)<\/li>\n<li>Lloren\u00ed\u00a7 Huguet Rotger (vocal)<\/li>\n<li>Emilio San Vicente Gargallo (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Miguel Soriano Ib\u00e1\u00f1ez El trabajo realizado en esta tesis consiste en el estudio del comportamiento de estructuras [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[332,15596,2489,16597,30362],"tags":[245338,15737,30364,12504,53254,245337],"class_list":["post-131519","post","type-post","status-publish","format-standard","hentry","category-ciencias-tecnologicas","category-politecnica-de-catalunya","category-tecnologia-de-las-telecomunicaciones","category-telefono","category-telegrafo","tag-amparo-fuster-sabate","tag-emilio-san-vicente-gargallo","tag-jose-luis-melus-moreno","tag-lloreni-huguet-rotger","tag-miguel-soriano-ibanez","tag-santos-gonzalez-gimenez"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/131519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=131519"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/131519\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=131519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=131519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=131519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}