Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

644 results

    • Seminar

    • Cryptography

    Public Key Encryption with Flexible Pattern Matching

    • March 25, 2022 (00:00 - 23:59)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Elie Bouscatié - Orange

    Many interesting applications of pattern matching (e.g. deep-packet inspection or medical data analysis) target very sensitive data. In particular, spotting illegal behaviour in internet traffic conflicts with legitimate privacy requirements, which usually forces users to blindly trust an entity that fully decrypts their traffic in the name of security. The compromise between traffic analysis and[…]
    • Seminar

    • Cryptography

    Cryptanalysis of code-based cryptosystems using the square-code distinguisher

    • February 07, 2020

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Mathieu Lequesne - INRIA

    Many code-based cryptosystems have been proposed recently, especially in response to the call for post-quantum cryptography standardization issued by the National Institute of Standards and Technologie. Most code-based cryptosystem rely on the same idea: an error-correcting code with some special structural properties (including good error-correction capacity) serves as the private key. This code[…]
    • Seminar

    • Cryptography

    Decoding Supercodes of Gabidulin Codes and Applications to Cryptanalysis

    • October 22, 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Maxime Bombar - Ecole Polytechnique

    Error correcting codes are well known to provide possible candidates for building quantum safe cryptographic primitives. Besides the Hamming metric which has a long-standing history, one may consider other metrics such as the rank metric. Gabidulin codes are the rank metric analogue of Reed-Solomon codes and can be efficiently decoded up to half the minimum distance. However, beyond this radius,[…]
    • Seminar

    • Cryptography

    Cryptographie post-quantique fondée sur les codes : les candidats à la standardisation

    • March 25, 2020

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Nicolas Sendrier - INRIA

    Au second tour du processus de standardisation du NIST, il reste 7 candidats dont la sécurité est fondée sur les code correcteurs, tous sont des mécanismes d'échange de clé. Nous les classifierons selon leurs hypothèses de sécurité et leurs propriétés. Nous trouvons les systèmes « historiques » (Classic McEliece et NTS-KEM), les systèmes fondés sur des matrices creuses et quasi-cycliques (BIKE,[…]
    • Seminar

    • Cryptography

    PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild

    • December 03, 2021

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Daniel De Almeida Braga - Université Rennes 1

    Protocols for password-based authenticated key exchange (PAKE) allow two users sharing only a short, low-entropy password to establish a secure session with a cryptographically strong key. The challenge in designing such protocols is that they must resist offline dictionary attacks in which an attacker exhaustively enumerates the dictionary of likely passwords in an attempt to match the used[…]
    • Seminar

    • Cryptography

    Considérations Pratiques sur les Compromis Temps-Mémoire Cryptanalytiques

    • November 26, 2019

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Florent Tardif - soutenance de thèse salle Métivier à l'IRISA, 14h30

    Un compromis temps-mémoire cryptanalytique est une technique qui vise à réduire le temps nécessaire pour effectuer certaines attaques cryptographiques telles que l’inversion d’une fonction à sens unique. Une telle inversion intervient dans une des principales applications des compromis temps-mémoire : le cassage de mots de passe. La technique requiert un très lourd pré-calcul qui génère des tables[…]