Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
615 results
-
-
Seminar
-
Cryptography
Power decoding of Hermitian codes in sub-quadratic time
Speaker : Johan Nielsen - INRIA Saclay Ile de France
Reed-Solomon codes have optimal minimum distance and we know efficient encoding and decoding algorithms of quasi-linear complexity in the length. Their main drawback is that their lengths are bounded by the size of the alphabet, i.e. the field over which they are defined. Algebraic geometry codes are a generalisation allowing longer codes on the same alphabet, and one of the most interesting sub[…] -
-
-
Seminar
-
Cryptography
Crypto coding
Speaker : Jean-Philippe Aumasson - Kudelski Security
La cryptographie est difficile à implémenter correctement; nous en avons récemment eu l'exemple avec "Heartbleed" et "goto fail". Nous essaierons d'abord de comprendre la source de ces problèmes, notamment en discutant les qualités de la librairie OpenSSL. Enfin, nous donnerons quelques exemples de recommendations aux développeurs pour éviter des problèmes propres à la cryptographie, tels que les […] -
-
-
Seminar
-
Cryptography
Comparaison de la factorisation d'entiers et du logarithme
Speaker : Pierrick Gaudry - LORIA
Le crible algébrique est le meilleur algorithme connu pour factoriser les entiers et pour calculer des logarithmes discrets dans des corps finis de grande caractérsitique. Bien que la complexité théorique est la même dans les deux cas, la phase d'algèbre linéaire est bien plus difficile dans le cas du logarithme discret. En revanche, les corps finis non premiers ont plus de structure, si bien que[…] -
-
-
Seminar
-
Cryptography
Functional Encryption: A novel paradigm for public-key encryption.
Speaker : Angelo De Caro - ENS
Whereas, in traditional public-key encryption, decryption is an all-or-nothing affair (i.e., a receiver is either able to recover the entire message using its key, or nothing), functional encryption enables fine-grained access control and computation on encrypted data, as required to protect data in the cloud.<br/> In the first part of the talk, we provide an introduction to functional encryption[…] -
-
-
Seminar
-
Cryptography
Cyclic and quasi-cyclic separable Goppa codes
Speaker : Sergey Bezzateev - Université d'État de Saint-Pétersbourg
Overview of recent results in constructions of cyclic and quasi-cyclic Goppa codes. Classical and generalized Goppa codes are considered. Subclasses of embedded optimal quasi-cyclic Goppa codes with improvement parameters are presented. -
-
-
Seminar
-
Cryptography
Disjunctions for Hash Proof Systems: New Constructions and Applications
Speaker : Fabrice Ben Hamouda - ENS
Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt'02) as a tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found many other applications, including password authenticated key exchange, oblivious transfer, and zero-knowledge arguments. One of the aspects that makes hash proof systems so interesting and powerful is that they can be[…] -