Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
633 results
-
-
Seminar
-
Cryptography
Explicit isogenies of low degree
Speaker : Kiminori Tsukazaki - University of Warwick
There are several algorithms for computing isogenies between elliptic curves, and one of them is Elkies' method using the modular curve. Motivated by that, we will look at an algebraic approach to explicitly compute isogenies of degree p for certain small primes p between elliptic curves, by using the modular curve and 'generic kernel polynomials'. -
-
-
Seminar
-
Cryptography
Key Recovery Attacks on 3-round Even-Mansour
Speaker : Itai Dinur - ENS
The Even-Mansour (EM) encryption scheme received a lot of attention in the last couple of years due to its exceptional simplicity and tight security proofs. The original $1$-round construction was naturally generalized into $r$-round structures with one key, two alternating keys, and completely independent keys.<br/> In this talk I will describe the first key recovery attack on the one-key 3-round[…] -
-
-
Seminar
-
Cryptography
Utilisation des symétries pour la résolution du problème de
Speaker : Louise Huot - LIP6
Récemment Diem et Gaudry ont introduit indépendemment une méthode de résolution du DLP sur les courbes elliptiques définies sur un corps fini non premier K, de degré d'extension n > 1 sur le corps de base k. Cet algorithme repose sur le principe général du calcul d'indice. Une étape cruciale de cet algorithme nécessite de décomposer des points de la courbe E(K) selon une base de facteurs. C'est à[…] -
-
-
Seminar
-
Cryptography
Algorithmique détendue pour les nombres entiers p-adiques
Speaker : Grégoire Lecerf - CNRS
Les implantations actuelles des nombres p-adiques reposent souvent sur des techniques dites zélées qui demandent de connaître à l'avance la précision nécessaire pour les calculs. Cette approche est très efficace du point de vue de la complexité asymptotique et elle est largement utilisée, par exemple dans des algorithmes de remontée de type Newton-Hensel intervenant dans la factorisation des[…] -
-
-
Seminar
-
Cryptography
Multiplication by n on elliptic curves over rings
Speaker : Jinbi Jin - Leiden university
Division polynomials express multiples of *affine* points on Weierstrass elliptic curves over fields. The restriction to affine points becomes an issue with elliptic curves over arbitrary rings, where it may happen that there are multiple 'points at infinity'. We will explain how a modification of the classical division polynomials describes multiplication on all points of Weierstrass elliptic[…] -
-
-
Seminar
-
Cryptography
Counting points on hyperelliptic curves in average polynomial time
Speaker : Kiran Kedlaya - San Diego University
We describe an algorithm of Harvey, improved and implemented by Harvey and Sutherland, which given a hyperelliptic curve of genus g over Q computes its zeta function over F_p for all p <= N in such a way that the average time per prime is polynomial in g and log(N). The method is based on p-adic cohomology, specifically the algorithms of Kedlaya and Harvey; the key new observation is that one can[…] -