Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
687 results
-
-
Seminar
-
Cryptography
Is there an L(1/4) algorithm for the discrete logarithm problem in algebraic curves?
Speaker : Maike Massierer - LORIA
The function field sieve, an algorithm of subexponential complexity L(1/3) that computes discrete logarithms in finite fields, has recently been improved to an L(1/4) algorithm, and subsequently to a quasi-polynomial time algorithm. Since index calculus algorithms for computing discrete logarithms in Jacobians of algebraic curves are based on very similar concepts and results, the natural question[…] -
-
-
Seminar
-
Cryptography
Relations entre les généralisations de la cryptanalyse différentielle et de la cryptanalyse linéaire.
Speaker : Céline Blondeau - Aalto
Durant les 25 dernières années, plusieurs généralisations de la cryptanalyse différentielle et de la cryptanalyse linéaire ont été proposées et ont permis d'attaquer un certain nombre de systèmes de chiffrement symétrique. Dans cet exposé, nous décrirons ces attaques et nous expliquerons les récents liens qui ont été trouvés entre différentes attaques de ces deux familles. En particulier nous[…] -
-
-
Seminar
-
Cryptography
Same-Values Analysis on Elliptic Curve Cryptography
Speaker : Cédric Murdica - Secure-IC
Elliptic Curve Cryptography (ECC) is believed to be unbreakable in the black box model, where the cryptanalyst has access to inputs and outputs only. However, it is not enough if the cryptosystem is embedded on a device that is physically accessible to potential attackers. In addition to inputs and outputs, the attacker can study the physical behaviour of the device such as the execution time or[…] -
-
-
Seminar
-
Cryptography
Power decoding of Hermitian codes in sub-quadratic time
Speaker : Johan Nielsen - INRIA Saclay Ile de France
Reed-Solomon codes have optimal minimum distance and we know efficient encoding and decoding algorithms of quasi-linear complexity in the length. Their main drawback is that their lengths are bounded by the size of the alphabet, i.e. the field over which they are defined. Algebraic geometry codes are a generalisation allowing longer codes on the same alphabet, and one of the most interesting sub[…] -
-
-
Seminar
-
Cryptography
A heuristic quasi-polynomial algorithm for discrete logarithm
Speaker : Razvan Basbulescu - LORIA
in finite fields of small characteristic The difficulty of discrete logarithm computations in fields GF(q^k) depends on the relative sizes of k and q. Until recently all the cases had a sub-exponential complexity of type L(1/3), similar to the complexity of factoring. If n is the bit-size of q^k, then L(1/3) can be approximated by 2^(n^(1/3)). In 2013, Joux designed a new algorithm for constant[…] -
-
-
Seminar
-
Cryptography
Learning with Errors in the Exponent
Speaker : özgür Dagdelen - Darmstadt University
We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the theory of learning in presence of errors [Regev, STOC'05] we ask if noise in the exponent amplifies intractability. We put forth the notion of Learning with Errors in the Exponent (LWEE) and rather surprisingly show that various attractive properties known to ex- clusively hold for lattices carry[…] -