{"id":31791,"date":"1997-01-01T00:00:00","date_gmt":"1997-01-01T00:00:00","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/estudio-de-algoritmos-criptograficos-de-clave-publica-basados-en-el-problema-del-logaritmo-discreto-utilizacion-de-curvas-elipticas-en-criptografia\/"},"modified":"1997-01-01T00:00:00","modified_gmt":"1997-01-01T00:00:00","slug":"estudio-de-algoritmos-criptograficos-de-clave-publica-basados-en-el-problema-del-logaritmo-discreto-utilizacion-de-curvas-elipticas-en-criptografia","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/matematicas\/estudio-de-algoritmos-criptograficos-de-clave-publica-basados-en-el-problema-del-logaritmo-discreto-utilizacion-de-curvas-elipticas-en-criptografia\/","title":{"rendered":"Estudio de algoritmos criptograficos de clave publica basados en el problema del logaritmo discreto. utilizacion de curvas elipticas en criptografia."},"content":{"rendered":"<h2>Tesis doctoral de <strong> Christian Marco Gomez <\/strong><\/h2>\n<p>En esta tesis se empieza estudiando que tipo de curvas elipticas son utilies para los criptosistemas basados en el logaritmo discreto, cuando se toma como grupo finito el conjunto de puntos de la curva eliptica en la operacion denominada suma eliptica. En primer lugar se analizan las caracteristicas que debe tener una curva eliptica criptograficamente util y luego se construyen varias familias de curvas elipticas adecuadas. El segundo estudio que se realiza es el dise\u00f1o de algoritmos criptograficos versatiles basados tambien en el logaritmo discreto. Se proponen nuevos algoritmos tanto de cifrado como de firma, se comparan con los ya existentes y se muestran las buenas prestaciones que poseen nuestros algoritmos, de los parametros que suelen considerarse relevantes. Finalmente en la tesis se proponen algoritmos de optimizacion para reduccion modular y exponenciacion modular, se estudian los tiempos de ejecucion de tales algoritmos y se observa que se obtiene una mejora muy considerable frente a los algoritmos existentes. Todos los algoritmos que se proponen en la tesis han sido programados en c++.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Estudio de algoritmos criptograficos de clave publica basados en el problema del logaritmo discreto. utilizacion de curvas elipticas en criptografia.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Estudio de algoritmos criptograficos de clave publica basados en el problema del logaritmo discreto. utilizacion de curvas elipticas en criptografia. <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Christian Marco Gomez <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Polit\u00e9cnica de catalunya<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 01\/01\/1997<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Mar\u00eda  Paz Morillo Bosch<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Jos\u00e9 Luis Mel\u00fas Moreno <\/li>\n<li>Josep Rifa Coma (vocal)<\/li>\n<li>Juan  Gabriel Tena Ayuso (vocal)<\/li>\n<li>Santos Gonzalez Jimenez (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Christian Marco Gomez En esta tesis se empieza estudiando que tipo de curvas elipticas son utilies para [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[1890,332,12500,126,15596,2489],"tags":[88302,30364,12503,12502,47498,25403],"class_list":["post-31791","post","type-post","status-publish","format-standard","hentry","category-ciencia-de-los-ordenadores","category-ciencias-tecnologicas","category-codigo-y-sistemas-de-codificacion","category-matematicas","category-politecnica-de-catalunya","category-tecnologia-de-las-telecomunicaciones","tag-christian-marco-gomez","tag-jose-luis-melus-moreno","tag-josep-rifa-coma","tag-juan-gabriel-tena-ayuso","tag-maria-paz-morillo-bosch","tag-santos-gonzalez-jimenez"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/31791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=31791"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/31791\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=31791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=31791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=31791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}