National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Side channels in cryptography
Budík, Lukáš ; Sobotka, Jiří (referee) ; Martinásek, Zdeněk (advisor)
This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.
Protection of Personal Data in Information System
Opletalová, Vendula ; Bašná, Romana (referee) ; Soukup, Tomáš (advisor)
The terms personal data and personal data protection have accopmanied ordinary social life of people in the Czech Republic only for several years. In the area of personal data protection it is necessary to receive measures to prevent misuse of personal data and thereby to avoid resulting sanction. Problems of personal data protection is complicated, discussion and polemics are held even in media.
Protection of Personal Data in Information System
Opletalová, Vendula ; Bašná, Romana (referee) ; Soukup, Tomáš (advisor)
The terms personal data and personal data protection have accopmanied ordinary social life of people in the Czech Republic only for several years. In the area of personal data protection it is necessary to receive measures to prevent misuse of personal data and thereby to avoid resulting sanction. Problems of personal data protection is complicated, discussion and polemics are held even in media.
Side channels in cryptography
Budík, Lukáš ; Sobotka, Jiří (referee) ; Martinásek, Zdeněk (advisor)
This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.