Securing cryptographic implementations against advanced attackers – Mgr. Ján Jančár
Mgr. Ján Jančár
Advanced ('rigorózní') thesis
Securing cryptographic implementations against advanced attackers
Securing cryptographic implementations against advanced attackers
Abstract:
Kryptografie zajišťuje kritické aspekty společnosti. Bez ohledu na to, zda ji používá informátor v represivním režimu v aplikaci pro zasílání zpráv s šifrováním end-to-end nebo uživatel platící za produkt online. Oba tito uživatelé mají předpoklady důvěrnosti, integrity a autenticity, které jsou částečně poskytovány kryptografií implementovanou v softwaru a hardwaru. Kryptografie je komplikovaná, spojuje …moreAbstract:
Cryptography secures critical aspects of society. Whether used by a whistle-blower under a repressive regime in an end-to-end encrypted messaging application or a user paying for a product online. Both of these users have assumptions of confidentiality, integrity, and authenticity, which are provided in part by cryptography implemented in software and hardware. Cryptography is complicated, combining …more
Language used: English
Date on which the thesis was submitted / produced: 20. 9. 2022
Identifier:
https://is.muni.cz/th/q9eqx/
Thesis defence
- Date of defence: 19. 1. 2023
- Reader: Prof. Lejla Batina, Prof. Virgil Gligor
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsAdvanced ('rigorózní řízení') programme / field:
Computer systems, communication and security / Computer systems, communication and security
Theses on a related topic
-
Analysis of attacks on variations of the Extended Hidden Number Problem
Michal Sládeček -
Cyber Attacks against Satellite Systems
Dominik Zachar -
Framework for analysis of employee reactions to social engineering attacks in Unity.
Václav Bílý -
Simulation of real-world side-channel attacks on elliptic-curve cryptography
Andrej Bátora -
Prediction of Network Attacks in Collaborative Environment
Martin Husák -
Attacks on censorship circumvention with intrusion detection systems
Vladimír Kravčík