Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Recolector de Ciencia Abierta, RECOLECTA
Bachelor thesis . 2025
License: CC BY NC ND
addClaim

Esquemas postcuánticos de firma digital basados en códigos correctores

Authors: Queipo Silva, Mario;

Esquemas postcuánticos de firma digital basados en códigos correctores

Abstract

Se puede entender la criptografía como una disciplina encargada de la protección de información, buscando que sólo aquellas personas autorizadas sean capaces de acceder a ella o manipularla. Originalmente, esta información tenía principalmente un carácter militar y diplomático, pero hoy en día es fundamental para la protección de información digitalizada permitiendo asegurar datos de interés como contraseñas, transacciones bancarias o conversaciones privadas. En esencia, la criptografía utiliza principios matemáticos y técnicas computacionales para cifrar y descifrar información. Algunas de estas técnicas incluyen sistemas de clave pública y privada, funciones de hash, técnicas de autenticación, esquemas de firma digital... que permiten proteger la información incluso frente a amenazas avanzadas, entre las cuales se encuentran los ordenadores cuánticos y las técnicas de criptografía ligadas a los mismos. La rama de la criptografía clásica dedicada a la defensa contra los posibles ataques que puedan surgir de la computación cuántica supone los cimientos de este trabajo.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green