Table of contents

Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

687 results

    • Seminar

    • Cryptography

    Borne inférieure pour les signatures préservant la structure symétriques

    • March 15, 2013

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Mehdi Tibouchi - LORIA

    Un schéma de signatures « préservant la structure » (SPS) est un schéma de signature numérique à clef publique dans lequel la clef publique, les messages et les signatures sont tous des n-uplets d'éléments de groupe bilinéaire, et la vérification de signature s'obtient en évaluant des produits de couplages. Cette primitive a de nombreuses applications à la construction de protocoles[…]
    • Seminar

    • Cryptography

    An explicit description of (log) de Rham cohomology over the Witt vector

    • October 19, 2012

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Moritz Minzlaff - Technische Universität Berlin

    Motivated by applications to computing zeta functions, we will discuss the log de Rham and de Rham cohomologies of smooth schemes (together with 'nice' divisors) over the Witt vectors. For the former, we will give an explicit description that eventually might lead to improvements to point counting algorithms. Regarding the latter, we will measure "how far" the de Rham cohomology of a curve is from[…]
    • Seminar

    • Cryptography

    Keccak

    • June 04, 2013

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Joan Daemen - ST Micro

    In October 2012, the American National Institute of Standards and Technology (NIST) announced the selection of Keccak as the winner of the SHA-3 Cryptographic Hash Algorithm Competition. This concluded an open competition that was remarkable both for its magnitude and the involvement of the cryptographic community. Public review is of paramount importance to increase the confidence in the new[…]
    • Seminar

    • Cryptography

    Usage of Modular Techniques for Efficient Computation of Ideal

    • December 07, 2012

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Kazuhiro Yokoyama - Rikkyo University

    Modular techniques are widely applied to various algebraic computations. (See [1] for basic modular techniques applied to polynomial computations.) In this talk, we discuss how modular techniques are efficiently applied to computation of various ideal operations such as Gröbner base computation and ideal decompositions. Here, by *modular techniques* we mean techniques using certain projections for[…]
    • Seminar

    • Cryptography

    Calculs de cup-produits et comptage de points.

    • October 11, 2013

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : François-Renaud Escriva - Vrije Universiteit Amsterdam

    Dans cet exposé, nous présentons un algorithme de comptage de points qui repose sur le calcul de certains cup-produits. Notre algorithme se fonde, comme l'algorithme de Kedlaya, sur le calcul de la matrice de l'action d'un Frobenius semi-linéaire sur le premier groupe de cohomologie d'une courbe. Cependant, notre algorithme a l'avantage de pouvoir s'appliquer à une classe très générale de courbes[…]
    • Seminar

    • Cryptography

    Cryptanalysis of FCSR-based stream ciphers

    • May 20, 2011

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Martin Hell - Lunds University

    Feedback with carry shift registers (FCSRs) can be seen as an alternative to LFSRs in stream cipher designs. Since the state is nonlinearly updated, the stream cipher +can be made more resistant to certain attacks than if LFSRs are used. In this talk I will give an overview of FCSR-based stream ciphers and discuss potential +weaknesses. One particular weakness has been exploited to mount efficient[…]