2 resultados para weak key-IV combinations
em CORA - Cork Open Research Archive - University College Cork - Ireland
Resumo:
This thesis focuses on the synthesis and analysis of novel chloride based platinum complexes derived from iminophosphine and phosphinoamide ligands, along with studies on their reactivity towards substitution and oxidation reactions. Also explored here are the potential applications of these complexes for biological and luminescent purposes. Chapter one provides an extensive overview of platinum coordination chemistry with examples of various mixed donor ligands along with the history of platinum anticancer therapy. It also looks at metals in medicine, both for biological functions as well as for therapeutic purposes and gives a background to some other applications for platinum complexes. Chapter two outlines the design and synthetic strategies employed for the development of novel platinum (II) chloride complexes from iminophosphine and phosphinoamide ligands. Also reported is the cyclometallation of these complexes to form stable tridentate mixed donor platinum (II) compounds. In Chapter three the development of a direct method for displacing a chloride from a platinum metal centre with a desired phosphine is reported. Numerous methods for successful oxidation of the platinum (II) complexes will also be explored, leading to novel platinum (IV) complexes being reported here also. The importance of stabilisation of the displaced anion, chloride, by the solvent system will also be discussed in this chapter. Chapter four investigates the reactivity of the platinum (II) complexes towards two different biomolecules to form novel platinum bio-adducts. The potential application of the platinum (II) cyclometallates as chemotherapeutics will also be explored here using in-vitro cancer cell testing. Finally, luminescence studies are also reported here for the ligands and platinum complexes reported in chapter two and three to investigate potential applications in this field also. Chapter five provides a final conclusion and an overall summary of the entire project as well as identifying key areas for future work.
Resumo:
Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated.