Detail publikace

APPLIED MODERN CRYPTOGRAPHY ON CONSTRAINED DEVICES

MALINA, L.

Originální název

APPLIED MODERN CRYPTOGRAPHY ON CONSTRAINED DEVICES

Anglický název

APPLIED MODERN CRYPTOGRAPHY ON CONSTRAINED DEVICES

Jazyk

en

Originální abstrakt

The habilitation thesis deals with modern public key cryptographic protocols and their effectiveness. The thesis focuses on the design and deployment of advanced asymmetric cryptographic schemes that are suitable for heterogeneous networks with constrained and small devices. The thesis consists of three main parts. The first part contains a description of conventional digital signatures and public key cryptographic schemes with enhanced security features. The second part presents a comprehensive practical assessment of cryptographic schemes implemented on various devices and platforms used in heterogeneous networks. The third part presents three author’s security proposals based on advanced cryptographic protocols. The first security system deals with access control and secure authentication based on smart cards. The second proposal provides efficient and secure data transfer with privacy protection between constrained and small devices such as smartphones and small embedded computers. The third proposal is based on a lightweight privacy-preserving ring signature scheme. The third method is suitable for anonymous transactions and e-voting services that run in an environment with constrained devices such as small devices and nodes in Internet of Things.

Anglický abstrakt

The habilitation thesis deals with modern public key cryptographic protocols and their effectiveness. The thesis focuses on the design and deployment of advanced asymmetric cryptographic schemes that are suitable for heterogeneous networks with constrained and small devices. The thesis consists of three main parts. The first part contains a description of conventional digital signatures and public key cryptographic schemes with enhanced security features. The second part presents a comprehensive practical assessment of cryptographic schemes implemented on various devices and platforms used in heterogeneous networks. The third part presents three author’s security proposals based on advanced cryptographic protocols. The first security system deals with access control and secure authentication based on smart cards. The second proposal provides efficient and secure data transfer with privacy protection between constrained and small devices such as smartphones and small embedded computers. The third proposal is based on a lightweight privacy-preserving ring signature scheme. The third method is suitable for anonymous transactions and e-voting services that run in an environment with constrained devices such as small devices and nodes in Internet of Things.

Dokumenty

BibTex


@misc{BUT161007,
  author="Lukáš {Malina}",
  title="APPLIED MODERN CRYPTOGRAPHY ON CONSTRAINED DEVICES",
  annote="The habilitation thesis deals with modern public key cryptographic protocols and their
effectiveness. The thesis focuses on the design and deployment of advanced asymmetric
cryptographic schemes that are suitable for heterogeneous networks with constrained
and small devices. The thesis consists of three main parts. The first part contains
a description of conventional digital signatures and public key cryptographic schemes
with enhanced security features. The second part presents a comprehensive practical
assessment of cryptographic schemes implemented on various devices and platforms
used in heterogeneous networks. The third part presents three author’s security proposals
based on advanced cryptographic protocols. The first security system deals with access
control and secure authentication based on smart cards. The second proposal provides
efficient and secure data transfer with privacy protection between constrained and small
devices such as smartphones and small embedded computers. The third proposal is
based on a lightweight privacy-preserving ring signature scheme. The third method is
suitable for anonymous transactions and e-voting services that run in an environment
with constrained devices such as small devices and nodes in Internet of Things.",
  chapter="161007",
  howpublished="online",
  year="2019",
  month="november",
  pages="1--166",
  type="habilitation thesis"
}