627 results

  • Cube Attacks on Tweakable Black Box Polynomials

    • October 24, 2008

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Adi Shamir - Weizmann Institute of Science

    In this talk I will introduce a new kind of attack on cryptosystems which can be represented by an (unknown) low degree polynomial with tweakable public variables such as a plaintext or IV and fixed secret variables such as a key. Its complexity is exponential in the degree but only polynomial in the key size, and it was successfully applied to several concrete schemes. In particular, for Trivium[…]
  • Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes

    • October 17, 2008

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Ayoub Otmani - Ensicaen

    We cryptanalyse here two variants of the McEliece cryptosystem based on quasi-cyclic codes. Both aim at reducing the key size by restricting the public and secret generator matrices to be in quasi-cyclic form. The first variant considers subcodes of a primitive BCH code. The aforementioned constraint on the public and secret keys implies to choose very structured permutations. We prove that this[…]
  • RSA problems with Lattice Reduction

    • October 17, 2008

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Alexander May - Technische Universität Darmstadt

    This survey addresses the problems of factoring and inverting the RSA function. We define practically relevant relaxed instances of these problems that can be solved in polynomial time. These problem instances are modelled by polynomial equations with small roots. In order to recover the roots, we make use of a method due to Coppersmith which is in turn based on the famous LLL lattice reduction.[…]
  • Fountain codes

    • October 07, 2008

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Amin Shokrollahi - EPFL

    A Fountain code is a code of fixed dimension and a limitless block-length. This is a new class of codes with very interesting applications. In this talk I will show how Fountain codes can be applied to the problem of reliable, robust, and speedy transmission of data over a heterogeneous network from one or multiple transmitters to one or multiple receivers. I will then talk about applications to[…]
  • Courbes elliptiques et applications cryptographiques à la diffusion numérique sécurisée

    • September 26, 2008

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Thomas Sirvent - IRMAR

    L'objet de cette thèse est la diffusion numérique sécurisée réalisée à l'aide de courbes elliptiques. Elle se compose de quatre chapitres :<br/> Le premier chapitre est consacré au calcul de points de l-torsion sur une courbe elliptique définie sur un corps fini de caractéristique p. Plus précisément, nous combinons un algorithme rapide de calcul d'isogénies dû à Bostan, Morain, Salvy et Schost[…]
  • Stream Ciphers - Now and Then

    • September 26, 2008

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Emilia Kasper - Katholieke Universiteit Leuven

    In November 2004, the European Network of Excellence for Cryptology (ECRYPT) launched a call for new stream cipher primitives. Authors from academia as well as industry submitted 34 designs, and in May 2008, 8 ciphers were chosen for the eSTREAM final portfolio. In this talk, we look back at the history of stream ciphers to understand the design choices made by cryptographers today. We start by[…]