Atac quàntic a la criptografia amb corbes el·líptiques

dc.contributor.advisorSans Gispert, Eloi
dc.contributor.authorCanal Guitart, Laia
dc.date.accessioned2021-04-26T10:25:25Z
dc.date.available2021-04-26T10:25:25Z
dc.date.issued2020-06-21
dc.descriptionTreballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2020, Director: Elois Sans Gispertca
dc.description.abstract[en] Generally, the majority of classical cryptography methods that use elliptical curves are based on the difficulty of classical computers to solve the discrete logarithm problem in polynomial time. Here we will study Peter Shor’s quantum attack derived from the algorithm for the discrete logarithm problem, published in 1994 [14]. We start with an introduction to elliptical curves and their use in criptography. Then we understand the mathematical foundations of the corresponding quantum computation to understand Shor’s algorithm, from which we will study how to reach it and why it works.ca
dc.format.extent51 p.
dc.format.mimetypeapplication/pdf
dc.identifier.urihttps://hdl.handle.net/2445/176693
dc.language.isocatca
dc.rightscc-by-nc-nd (c) Laia Canal Guitart, 2020
dc.rights.accessRightsinfo:eu-repo/semantics/openAccessca
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/*
dc.sourceTreballs Finals de Grau (TFG) - Matemàtiques
dc.subject.classificationXifratge (Informàtica)ca
dc.subject.classificationTreballs de fi de grau
dc.subject.classificationTeoria quànticaca
dc.subject.classificationCorbes el·líptiquesca
dc.subject.classificationComplexitat computacionalca
dc.subject.otherData encryption (Computer science)en
dc.subject.otherBachelor's theses
dc.subject.otherQuantum theoryen
dc.subject.otherElliptic curvesen
dc.subject.otherComputational complexityen
dc.titleAtac quàntic a la criptografia amb corbes el·líptiquesca
dc.typeinfo:eu-repo/semantics/bachelorThesisca

Fitxers

Paquet original

Mostrant 1 - 1 de 1
Carregant...
Miniatura
Nom:
176693.pdf
Mida:
720.59 KB
Format:
Adobe Portable Document Format
Descripció:
Memòria