{"id":46165,"date":"2019-09-20T05:05:12","date_gmt":"2019-09-20T05:05:12","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/diseno-de-metodos-criptograficos-para-la-proteccion-de-la-informacion-en-sistemas-de-ordenadores\/"},"modified":"2019-09-20T05:05:12","modified_gmt":"2019-09-20T05:05:12","slug":"diseno-de-metodos-criptograficos-para-la-proteccion-de-la-informacion-en-sistemas-de-ordenadores","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/matematicas\/diseno-de-metodos-criptograficos-para-la-proteccion-de-la-informacion-en-sistemas-de-ordenadores\/","title":{"rendered":"Dise\u00f1o de metodos criptograficos para la proteccion de la informacion en sistemas de ordenadores."},"content":{"rendered":"<h2>Tesis doctoral de <strong> Justo Sancho Rodriguez <\/strong><\/h2>\n<p>Se describe en esta tesis  como antecedentes  los principios basicos de la criptografia  siendo el tema principal el estudio de las funciones booleanas reversibles multivariables  que son utiles a los metodos criptograficos en el ordenador. En base a las funciones determinadas se dise\u00f1an programas de cifrado y descifrado y se analiza la seguridad de las mismas. Las claves se obtienen de la memoria del ordenador y por procedimientos de generacion de numeros pseudoaleatorios. Tambien  se estudian la redundancia del lenguaje espa\u00f1ol y su relacion con la distancia de unicidad  utilizandose un procedimiento mecanizado; cuyos resultados constituyen una aportacion al conocimiento de la lengua espa\u00f1ola.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Dise\u00f1o de metodos criptograficos para la proteccion de la informacion en sistemas de ordenadores.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Dise\u00f1o de metodos criptograficos para la proteccion de la informacion en sistemas de ordenadores. <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Justo Sancho Rodriguez <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Polit\u00e9cnica de Madrid<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 01\/01\/1979<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Rafael Portaencasa Baeza<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Rafael Portaencasa Baeza <\/li>\n<li>Julio Fernandez Blarge (vocal)<\/li>\n<li>Narciso Garcia Redondo (vocal)<\/li>\n<li>Fernando Saez Vacas (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Justo Sancho Rodriguez Se describe en esta tesis como antecedentes los principios basicos de la criptografia siendo [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[1890,332,4149,45250,126,16008,2535],"tags":[30662,110866,110865,108581,16290],"class_list":["post-46165","post","type-post","status-publish","format-standard","hentry","category-ciencia-de-los-ordenadores","category-ciencias-tecnologicas","category-diseno-y-componentes-de-sistemas-de-informacion","category-mantenimiento-de-ordenadores","category-matematicas","category-politecnica-de-madrid","category-tecnologia-de-los-ordenadores","tag-fernando-saez-vacas","tag-julio-fernandez-blarge","tag-justo-sancho-rodriguez","tag-narciso-garcia-redondo","tag-rafael-portaencasa-baeza"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/46165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=46165"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/46165\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=46165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=46165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=46165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}