National Repository of Grey Literature 12 records found  1 - 10next  jump to record: Search took 0.09 seconds. 
Entrance and security systems
Kohut, Michal ; Šedivá, Soňa (referee) ; Fiedler, Petr (advisor)
During writing this bachelor labour I strived to describe some entrace and security systems and their parts. Also some functions and usage of these systems were consecrated and there was introduced their division. I concerned also with observing of preventive exchanges, their properties and operating. The last part describe state machine of security central. It is diveded to 4 smaller state macines which were all tested using IAR visualSTATE program.
Side channel attacks on chip cards
Matějka, Jiří ; Morský, Ondřej (referee) ; Martinásek, Zdeněk (advisor)
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method in cryptanalysis. Unlike classical cryptanalysis, which looks for weaknesses of mathematical structure of algorithms, side channel’s analysis use weaknesses of physical implementation of these algorithms. First part describes chip cards, their usage a security. There is mentioned the issue of cryptographic algorithms and their implementation on smart cards. There are described well-known side channels and examples of their abuse. Practical part of this thesis is focused on a proposal of a laboratory task, which demonstrates power-based side channel attack on smart card. There is designed laboratory workplace for this task, software for measurement and analysis is implemented in development tool LabVIEW. In the last part is this attack realized, the target of this attack is a standard SIM card.
Application for programmable smart cards
Broda, Jan ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The theoretical part of the bachelor thesis deals with the issue of secure attribute authentication, which places great emphasis on the protection of privacy and digital identity. The next part of the work deals with chip cards with MultOS operation system. The practical goal of this work is to create authentication application in C language using the attribute scheme CDDH19 and revocation scheme CDH16. The attribute scheme is based on signature scheme weak Boneh Boyen and on algebraic MAC funcion. For development it was used an interface Eclipse IDE with development environment SmartDeck. The final application will allow the users secure attribute authentication without any risks of leak of sensitive information. This application is implemented on MultOS chip card and tested in cooperation with the student, who programmed the verifier side on the microcomputer Raspberry PI.
Cryptography and security on the MultOS platform
Lidmila, Aleš ; Ilgner, Petr (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis deals with the development of a security IoT system for user authentication using the MultOS platform. It also deals with the development and descriptionof a publishing system that manages MultOS endpoints.
Entrance and security systems
Kohut, Michal ; Bradáč, Zdeněk (referee) ; Fiedler, Petr (advisor)
During writing this bachelor labour I strived to describe some entrace and security systems and their parts. Also some functions and usage of these systems were consecrated and there was introduced their division. I concerned also with observing of preventive exchanges, their properties and operating. At the end there was proposed a status automat machine of a smaller preventive exchange, which was adjusted in the program IAR visualSTATE.
Cryptography and security on the MultOS platform
Lidmila, Aleš ; Ilgner, Petr (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis deals with the development of a security IoT system for user authentication using the MultOS platform. It also deals with the development and descriptionof a publishing system that manages MultOS endpoints.
Application for programmable smart cards
Broda, Jan ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The theoretical part of the bachelor thesis deals with the issue of secure attribute authentication, which places great emphasis on the protection of privacy and digital identity. The next part of the work deals with chip cards with MultOS operation system. The practical goal of this work is to create authentication application in C language using the attribute scheme CDDH19 and revocation scheme CDH16. The attribute scheme is based on signature scheme weak Boneh Boyen and on algebraic MAC funcion. For development it was used an interface Eclipse IDE with development environment SmartDeck. The final application will allow the users secure attribute authentication without any risks of leak of sensitive information. This application is implemented on MultOS chip card and tested in cooperation with the student, who programmed the verifier side on the microcomputer Raspberry PI.
Entrance and security systems
Kohut, Michal ; Bradáč, Zdeněk (referee) ; Fiedler, Petr (advisor)
During writing this bachelor labour I strived to describe some entrace and security systems and their parts. Also some functions and usage of these systems were consecrated and there was introduced their division. I concerned also with observing of preventive exchanges, their properties and operating. At the end there was proposed a status automat machine of a smaller preventive exchange, which was adjusted in the program IAR visualSTATE.
Entrance and security systems
Kohut, Michal ; Šedivá, Soňa (referee) ; Fiedler, Petr (advisor)
During writing this bachelor labour I strived to describe some entrace and security systems and their parts. Also some functions and usage of these systems were consecrated and there was introduced their division. I concerned also with observing of preventive exchanges, their properties and operating. The last part describe state machine of security central. It is diveded to 4 smaller state macines which were all tested using IAR visualSTATE program.
Side channel attacks on chip cards
Matějka, Jiří ; Morský, Ondřej (referee) ; Martinásek, Zdeněk (advisor)
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method in cryptanalysis. Unlike classical cryptanalysis, which looks for weaknesses of mathematical structure of algorithms, side channel’s analysis use weaknesses of physical implementation of these algorithms. First part describes chip cards, their usage a security. There is mentioned the issue of cryptographic algorithms and their implementation on smart cards. There are described well-known side channels and examples of their abuse. Practical part of this thesis is focused on a proposal of a laboratory task, which demonstrates power-based side channel attack on smart card. There is designed laboratory workplace for this task, software for measurement and analysis is implemented in development tool LabVIEW. In the last part is this attack realized, the target of this attack is a standard SIM card.

National Repository of Grey Literature : 12 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.