|
2 | 2 | \providecommand\hyper@newdestlabel[2]{} |
3 | 3 | \citation{aho1986compilers} |
4 | 4 | \@writefile{toc}{\contentsline {chapter}{Conceptos te\IeC {\'o}ricos}{5}{chapter*.6}} |
5 | | -\@writefile{toc}{\contentsline {section}{\numberline {3.1}\IeC {\textquestiondown } Qu\IeC {\'e} es una gram\IeC {\'a}tica y para qu\IeC {\'e} sirve?}{5}{section.3.1}} |
6 | | -\@writefile{toc}{\contentsline {section}{\numberline {3.2}Cifrado de contrase\IeC {\~n}as y seguridad en Thoth Web}{7}{section.3.2}} |
7 | | -\@writefile{toc}{\contentsline {subsection}{Funcionamiento del algoritmo hash}{7}{section*.7}} |
8 | | -\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Aplicaci\IeC {\'o}n de la funci\IeC {\'o}n hash a diferentes datos introducidos.}}{8}{figure.3.1}} |
9 | | -\newlabel{fig:3.1}{{\M@TitleReference {3.1}{Aplicaci\IeC {\'o}n de la funci\IeC {\'o}n hash a diferentes datos introducidos.}}{8}{Aplicación de la función hash a diferentes datos introducidos}{figure.3.1}{}} |
10 | | -\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Ejemplo de ataque con tablas de b\IeC {\'u}squeda.}}{9}{figure.3.2}} |
11 | | -\newlabel{fig:3.2}{{\M@TitleReference {3.2}{Ejemplo de ataque con tablas de b\IeC {\'u}squeda.}}{9}{Ejemplo de ataque con tablas de búsqueda}{figure.3.2}{}} |
12 | | -\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces Resultado de aplicar tablas de b\IeC {\'u}squeda al cifrado hash con semilla.}}{9}{figure.3.3}} |
13 | | -\newlabel{fig:3.3}{{\M@TitleReference {3.3}{Resultado de aplicar tablas de b\IeC {\'u}squeda al cifrado hash con semilla.}}{9}{Resultado de aplicar tablas de búsqueda al cifrado hash con semilla}{figure.3.3}{}} |
| 5 | +\@writefile{toc}{\contentsline {section}{\numberline {3.1}\IeC {\textquestiondown }Qu\IeC {\'e} es una gram\IeC {\'a}tica y para qu\IeC {\'e} sirve?}{5}{section.3.1}} |
| 6 | +\@writefile{toc}{\contentsline {section}{\numberline {3.2}Tipos de gram\IeC {\'a}ticas }{7}{section.3.2}} |
| 7 | +\@writefile{toc}{\contentsline {section}{\numberline {3.3}Cifrado de contrase\IeC {\~n}as y seguridad en Thoth Web}{9}{section.3.3}} |
| 8 | +\@writefile{toc}{\contentsline {subsection}{Funcionamiento del algoritmo hash}{9}{section*.7}} |
| 9 | +\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Aplicaci\IeC {\'o}n de la funci\IeC {\'o}n hash a diferentes datos introducidos. \url {https://blog.kaspersky.com.mx/que-es-un-hash-y-como-funciona/2806/}}}{10}{figure.3.1}} |
| 10 | +\newlabel{fig:3.1}{{\M@TitleReference {3.1}{Aplicaci\IeC {\'o}n de la funci\IeC {\'o}n hash a diferentes datos introducidos. \url {https://blog.kaspersky.com.mx/que-es-un-hash-y-como-funciona/2806/}}}{10}{Aplicación de la función hash a diferentes datos introducidos. \url {https://blog.kaspersky.com.mx/que-es-un-hash-y-como-funciona/2806/}}{figure.3.1}{}} |
| 11 | +\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Ejemplo de ataque con tablas de b\IeC {\'u}squeda. Imagen sacada de \url {https://crackstation.net/}}}{11}{figure.3.2}} |
| 12 | +\newlabel{fig:3.2}{{\M@TitleReference {3.2}{Ejemplo de ataque con tablas de b\IeC {\'u}squeda. Imagen sacada de \url {https://crackstation.net/}}}{11}{Ejemplo de ataque con tablas de búsqueda. Imagen sacada de \url {https://crackstation.net/}}{figure.3.2}{}} |
| 13 | +\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces Resultado de aplicar tablas de b\IeC {\'u}squeda al cifrado hash con semilla. Imagen sacada de \url {https://crackstation.net/}}}{11}{figure.3.3}} |
| 14 | +\newlabel{fig:3.3}{{\M@TitleReference {3.3}{Resultado de aplicar tablas de b\IeC {\'u}squeda al cifrado hash con semilla. Imagen sacada de \url {https://crackstation.net/}}}{11}{Resultado de aplicar tablas de búsqueda al cifrado hash con semilla. Imagen sacada de \url {https://crackstation.net/}}{figure.3.3}{}} |
14 | 15 | \citation{wiki:latex} |
15 | 16 | \citation{koza92} |
16 | | -\@writefile{toc}{\contentsline {subsection}{Subsecciones}{10}{section*.8}} |
17 | | -\@writefile{toc}{\contentsline {subsubsection}{Subsubsecciones}{10}{section*.9}} |
18 | | -\@writefile{toc}{\contentsline {section}{\numberline {3.3}Referencias}{10}{section.3.3}} |
19 | | -\@writefile{toc}{\contentsline {section}{\numberline {3.4}Im\IeC {\'a}genes}{10}{section.3.4}} |
20 | | -\@writefile{lof}{\contentsline {figure}{\numberline {3.4}{\ignorespaces Aut\IeC {\'o}mata para una expresi\IeC {\'o}n vac\IeC {\'\i }a}}{11}{figure.3.4}} |
21 | | -\newlabel{fig:escudoInfor}{{\M@TitleReference {3.4}{Aut\IeC {\'o}mata para una expresi\IeC {\'o}n vac\IeC {\'\i }a}}{11}{Autómata para una expresión vacía}{figure.3.4}{}} |
22 | | -\@writefile{toc}{\contentsline {section}{\numberline {3.5}Listas de items}{11}{section.3.5}} |
23 | | -\@writefile{lot}{\contentsline {table}{\numberline {3.1}{\ignorespaces Herramientas y tecnolog\IeC {\'\i }as utilizadas en cada parte del proyecto}}{12}{table.3.1}} |
24 | | -\newlabel{tabla:herramientasportipodeuso}{{\M@TitleReference {3.1}{Herramientas y tecnolog\IeC {\'\i }as utilizadas en cada parte del proyecto}}{12}{Herramientas y tecnologías utilizadas en cada parte del proyecto}{table.3.1}{}} |
25 | | -\@writefile{toc}{\contentsline {section}{\numberline {3.6}Tablas}{12}{section.3.6}} |
| 17 | +\@writefile{toc}{\contentsline {subsection}{Subsecciones}{12}{section*.8}} |
| 18 | +\@writefile{toc}{\contentsline {subsubsection}{Subsubsecciones}{12}{section*.9}} |
| 19 | +\@writefile{toc}{\contentsline {section}{\numberline {3.4}Referencias}{12}{section.3.4}} |
26 | 20 | \@setckpt{./tex/3_Conceptos_teoricos}{ |
27 | 21 | \setcounter{page}{13} |
28 | 22 | \setcounter{equation}{0} |
29 | | -\setcounter{enumi}{2} |
| 23 | +\setcounter{enumi}{0} |
30 | 24 | \setcounter{enumii}{0} |
31 | 25 | \setcounter{enumiii}{0} |
32 | 26 | \setcounter{enumiv}{0} |
|
37 | 31 | \setcounter{book}{0} |
38 | 32 | \setcounter{part}{0} |
39 | 33 | \setcounter{chapter}{3} |
40 | | -\setcounter{section}{6} |
| 34 | +\setcounter{section}{4} |
41 | 35 | \setcounter{subsection}{0} |
42 | 36 | \setcounter{subsubsection}{0} |
43 | 37 | \setcounter{paragraph}{0} |
|
72 | 66 | \setcounter{bsm@mctr}{0} |
73 | 67 | \setcounter{workm@mctr}{0} |
74 | 68 | \setcounter{sheetsequence}{23} |
75 | | -\setcounter{lastsheet}{31} |
76 | | -\setcounter{lastpage}{21} |
77 | | -\setcounter{figure}{4} |
| 69 | +\setcounter{lastsheet}{32} |
| 70 | +\setcounter{lastpage}{22} |
| 71 | +\setcounter{figure}{3} |
78 | 72 | \setcounter{lofdepth}{1} |
79 | | -\setcounter{table}{1} |
| 73 | +\setcounter{table}{0} |
80 | 74 | \setcounter{lotdepth}{1} |
81 | 75 | \setcounter{PWSTtable}{0} |
82 | | -\setcounter{Item}{2} |
| 76 | +\setcounter{Item}{0} |
83 | 77 | \setcounter{Hfootnote}{1} |
84 | 78 | \setcounter{memhycontfloat}{0} |
85 | 79 | \setcounter{Hpagenote}{0} |
86 | | -\setcounter{bookmark@seq@number}{12} |
| 80 | +\setcounter{bookmark@seq@number}{10} |
87 | 81 | \setcounter{parentequation}{0} |
88 | 82 | \setcounter{section@level}{1} |
89 | 83 | } |
0 commit comments