Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

652 results

    • Seminar

    • Cryptography

    Permutations complètes en caractéristique 2.

    • February 10, 2017

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Valentin Suder - Université de Versailles Saint-Quentin

    Dans ce travail, nous nous intéressons aux permutations complètes, c’est-à-dire aux fonctions bijectives $x\mapsto f(x)$ telles que $x\mapsto f(x)+x$ soient aussi bijectives. Plus particulièrement, nous nous intéressons aux permutations complètes sur les corps finis $\mathbb{F}_{2^n}$. En caractéristique 2, la définition des permutations complètes coincide avec celle des orthomorphismes. Nous[…]
    • Seminar

    • Cryptography

    Lilliput: Advances in Security and Performance Analysis

    • November 17, 2017

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Julien Francq - Airbus CyberSecurity

    Lilliput is a block cipher that has been published in 2015 in IEEE Transactions in Computers with Thierry Berger and Marine Minier, and the seminal paper has been cited 6 times for now. This talk will summarize the results of the third-party cryptanalysis and implementations, and will show that Lilliput is still an efficient and secure cryptographic primitives.
    • Seminar

    • Cryptography

    Open problems in isogeny-based cryptography

    • May 05, 2017

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Luca De Feo - Université de Versailles Saint-Quentin

    Isogeny-based cryptography (IBC) is a very young field, only 10 years old. Protocols in this family include key-exchange, encryption, "provably secure" hash functions and trapdoor systems. Hardness assumptions in IBC come from the difficulty of finding paths in isogeny graphs, that is graphs of elliptic curves linked by isogenies of some prescribed degree.<br/> Recently some IBC protocols have[…]
    • Seminar

    • Cryptography

    Soutenance de thèse : Algorithmes de recherche sur bases de données chiffrées

    • January 08, 2018

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Raphaël Bost - Université Rennes 1

    La recherche sur les bases de données chiffrées vise à rendre e cace une tâche apparemment simple : déléguer le stockage de données à un serveur qui ne serait pas de con ance, tout en conservant des fonctionnalités de recherche. Avec le développement des services de stockage dans le Cloud, destinés aussi bien aux entreprises qu’aux individus, la mise au point de solutions e caces à ce problème est[…]
    • Seminar

    • Cryptography

    Complete Addition Formulas for Prime Order Elliptic Curves

    • December 09, 2016

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Joost Renes - University of Nijmegen

    An elliptic curve addition law is said to be complete if it correctly computes the sum of any two points in the elliptic curve group. One of the main reasons for the increased popularity of Edwards curves in the ECC community is that they can allow a complete group law that is also relatively efficient (e.g., when compared to all known addition laws on Edwards curves). Such complete addition[…]
    • Seminar

    • Cryptography

    identity-based encryption with rank metric

    • September 15, 2017

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Adrien Hauteville - Université de Limoges

    Code-based cryptography has a long history, almost as long as the history of public-key encryption (PKE). While we can construct almost all primitives from codes such as PKE, signature, group signature etc, it is a long standing open problem to construct an identity-based encryption from codes. We solve this problem by relying on codes with rank metric. The concept of identity-based encryption […]