Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
644 results
-
-
Seminar
-
Cryptography
Systèmes bilinéaires et déterminantiels : algorithmes, complexité et
Speaker : Pierre-Jean Spaenlehauer - LIP6
Dans cet exposé, nous étudions des méthodes de résolution de deux types de systèmes polynomiaux structurés : les systèmes bilinéaires et déterminantiels. L'objectif principal est d'étudier les propriétés algébriques de ces systèmes pour en accélérer la résolution et pour borner la complexité des algorithmes de calcul de bases de Gröbner. Ceci passe par l'obtention de nouvelles bornes fines sur la[…] -
-
-
Seminar
-
Cryptography
Intégration numérique prouvée pour la théorie des nombres
Speaker : Pascal Molin - Université Bordeaux I
La théorie des nombres rend nécessaire le calcul de certaines intégrales à des précisions permettant un travail arithmétique. On présentera une méthode à la fois simple, rapide et prouvée pour y parvenir. Il existe depuis une vingtaine d'années un paradigme d'intégration numérique, dit des fonctions doublement exponentielles, qui dans la pratique converge très rapidement pour des fonctions[…] -
-
-
Seminar
-
Cryptography
Support for p-adics in Sage: present and future
Speaker : David Roe - Harvard
I will describe the current capabilities within Sage for arithmetic in p-adic rings and fields, as well as support for polynomials, matrices, hyperelliptic curves and p-adic L-functions. I will then discuss plans for improvements to these areas. -
-
-
Seminar
-
Cryptography
Recent results about side-channel attacks and countermeasures.
Speaker : François-Xavier Standaert - Université de Louvain
Traditionally, cryptographic algorithms provide security against an adversary who has only black box access to cryptographic devices. That is, the only thing the adversary can do is to query the cryptographic algorithm on inputs of its choice and analyze the responses, which are always computed according to the correct original secret information. However, such a model does not always correspond[…] -
-
-
Seminar
-
Cryptography
Cube Attacks on Tweakable Black Box Polynomials
Speaker : Adi Shamir - Weizmann Institute of Science
In this talk I will introduce a new kind of attack on cryptosystems which can be represented by an (unknown) low degree polynomial with tweakable public variables such as a plaintext or IV and fixed secret variables such as a key. Its complexity is exponential in the degree but only polynomial in the key size, and it was successfully applied to several concrete schemes. In particular, for Trivium[…] -
-
-
Seminar
-
Cryptography
A Residue Approach of the Finite Fields Arithmetics
Speaker : Jean-Claude Bajard - Université de Montpellier
Finite fields arithmetic is one of the challenges in current computer arithmetic. It occurs, in particular, in cryptography where the needs increase with the evolution of the technologies and also of the attacks. Through our research, we have proposed different systems based on residues representations. Different kinds of finite fields are concerned with. For each of them, some specificities of[…] -