Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

615 results

    • Seminar

    • Cryptography

    Broadcast encryption: combinatorial vs. algebraic methods

    • April 10, 2015

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Duong-Hieu Phan - ENS

    We consider a generalisation of the encryption from "one-to-one'' to "one-to-many'' communication, i.e. broadcast encryption. The objective is to allow a center to send secret messages to a large number of receivers. The security notion in “one-to-many” communications needs to be extended beyond the notion of confidentiality in “one-to-one” encryption in order to meet practical requirements. Two[…]
    • Seminar

    • Cryptography

    Beyond the black and grey box

    • April 25, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Yoni De Mulder - University of Leuven

    In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted open platform, the adversary has full access to the implementation and its execution environment. As a result, the adversary is much more powerful than in a traditional black-box environment in which the adversary has only access to the inputs and outputs of a[…]
    • Seminar

    • Cryptography

    GGHLite: More Efficient Multilinear Maps from Ideal Lattices

    • December 05, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Adeline Langlois - ENS Lyon

    The GGH Graded Encoding Scheme (of Garg, Gentry and Halevi), based on ideal lattices, is the first plausible approximation to a cryptographic multilinear map. Unfortunately, using the security analysis the authors provided, the scheme requires very large parameters to provide security for its underlying encoding re-randomization process. Our main contributions are to formalize, simplify and[…]
    • Seminar

    • Cryptography

    Une solution du problème "Isomorphisme de polynômes à deux

    • September 26, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Jérôme Plût - ANSSI

    Le problème d'isomorphisme de polynômes à deux secrets (IP2S) pour m=2 variables sur un corps k est le suivant: étant données deux familles a, b de deux polynômes quadratiques chacune, trouver deux applications linéaires bijectives s, t telles que b = t ° a ° s. Nous donnons un algorithme permettant de calculer s, t en un temps O(n^4) pour toutes les instances.<br/> Le problème IP2S a été[…]
    • Seminar

    • Cryptography

    Attaques quantiques contre les chiffrements par bloc composés

    • March 13, 2015

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Marc Kaplan - Télécom ParisTech

    Nous étudions l'amplification de la sécurité obtenue en composant des chiffrements par bloc indépendants. Dans le cas classique, l'attaque Meet-in-the-middle est une attaque générique contre ces constructions. Si le temps nécessaire pour briser un chiffrement par bloc est t, alors cette attaque permet de briser deux chiffrements par bloc en un temps seulement 2t, alors qu'un cryptographe naïf[…]
    • Seminar

    • Cryptography

    Keep your friends close with distance-bounding protocols

    • February 07, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Maria Cristina Onete - IRISA

    Authentication protocols, run between a prover and a verifier, allow the verifier to check the legitimacy of the prover. A legitimate prover should always authenticate (the correctness requirement), while illegitimate parties (adversaries) should not authenticate (the soundness or impersonation resistance requirement). Secure authentication protocols thwart most Man-in-the-Middle (MIM) attacks,[…]