627 results
-
Falcon un schéma de signature sur les réseaux euclidiens NTRU
Speaker : Thomas Ricosset - Thales Communications & Security, INP-ENSEEIHT
Dans cette présentation je décrirai le schéma de signature Falcon, pour "FAst Fourier Lattice-based COmpact signatures over NTRU", basé sur le schéma de signature hash-and-sign de Gentry, Peikert et Vaikuntanathan. Je présenterai les outils et techniques permettant à Falcon d'offrir aujourd'hui, à faibles coûts, les signatures les plus compactes sur les réseaux euclidiens : une version randomisée[…] -
Adaptive Oblivious Transfer with Access Control for NC1 from LWE
Speaker : Fabrice Mouhartem - Ens Lyon
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database M_1, …, M_N. Then, a receiver can query the sender up to k times with private indexes ρ_1, …, ρ_k so as to obtain M_{ρ_1}, …, M_{ρ_k} and nothing else. Moreover, for each i ∈ [k], the receiver’s choice ρ_i may depend on previously obtained messages {M_{ρ_j}}_{j< i} . Oblivious transfer with access control[…] -
Où en est-on avec le calcul quantique?
Speaker : Dimitri Petritis - IRMAR
Le calculateur universel quantique n'a toujours pas dépassé le stade de prototype de démonstration et reste insuffisant pour faire tourner l'algorithme de factorisation de Shor sur des instances réalistes. Cependant, des avancées algorithmiques ont été faites sur des machines quantiques dédiées qui permettent d'aborder certains problèmes difficiles (au sens de la complexité); ces nouvelles[…] -
Open problems in isogeny-based cryptography
Speaker : Luca De Feo - Université de Versailles Saint-Quentin
Isogeny-based cryptography (IBC) is a very young field, only 10 years old. Protocols in this family include key-exchange, encryption, "provably secure" hash functions and trapdoor systems. Hardness assumptions in IBC come from the difficulty of finding paths in isogeny graphs, that is graphs of elliptic curves linked by isogenies of some prescribed degree.<br/> Recently some IBC protocols have[…] -
A Modular Security Analysis of EAP and IEEE 802.11
Speaker : Haakon Jacobsen - TBD
The Extensible Authentication Protocol (EAP) is a widely used three-party authentication framework that allows a client to connect to a wireless access point it does not share a secret with, using a mutually trusted server. EAP is often found in enterprise networks or large organizations to provide central key-management and user authentication; one prime example being the eduroam network.<br/> In[…] -
Attaques sur des conversions IND-CCA de systèmes basés sur les codes
Speaker : Paul Stankovski - Université de Lund
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community, including several larger projects and a standardization effort from {NIST}. One of the most promising algorithms is the code-based scheme called QC-MDPC, which has excellent performance and a small public key size.<br/> In this work we present a very efficient key recovery[…]