Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
688 results
-
-
Seminar
-
Cryptography
Comparaison de la factorisation d'entiers et du logarithme
Speaker : Pierrick Gaudry - LORIA
Le crible algébrique est le meilleur algorithme connu pour factoriser les entiers et pour calculer des logarithmes discrets dans des corps finis de grande caractérsitique. Bien que la complexité théorique est la même dans les deux cas, la phase d'algèbre linéaire est bien plus difficile dans le cas du logarithme discret. En revanche, les corps finis non premiers ont plus de structure, si bien que[…] -
-
-
Seminar
-
Cryptography
Functional Encryption: A novel paradigm for public-key encryption.
Speaker : Angelo De Caro - ENS
Whereas, in traditional public-key encryption, decryption is an all-or-nothing affair (i.e., a receiver is either able to recover the entire message using its key, or nothing), functional encryption enables fine-grained access control and computation on encrypted data, as required to protect data in the cloud.<br/> In the first part of the talk, we provide an introduction to functional encryption[…] -
-
-
Seminar
-
Cryptography
Un algorithme pour trouver toutes les formules calculant une application bilinéaire.
Speaker : Nicolas Estibal - IRISA
La multiplication est une opération arithmétique coûteuse comparativement à l'addition. Aussi il est intéressant, étant donné une application, de minimiser le nombre de produits à effectuer pour la calculer. Dans cette étude, nous nous restreignons au cas des applications bilinéaires.<br/> En effet, parmi les applications bilinéaires, nous étions intéressés en premier lieu par la multiplication[…] -
-
-
Seminar
-
Cryptography
Cyclic and quasi-cyclic separable Goppa codes
Speaker : Sergey Bezzateev - Université d'État de Saint-Pétersbourg
Overview of recent results in constructions of cyclic and quasi-cyclic Goppa codes. Classical and generalized Goppa codes are considered. Subclasses of embedded optimal quasi-cyclic Goppa codes with improvement parameters are presented. -
-
-
Seminar
-
Cryptography
Disjunctions for Hash Proof Systems: New Constructions and Applications
Speaker : Fabrice Ben Hamouda - ENS
Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt'02) as a tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found many other applications, including password authenticated key exchange, oblivious transfer, and zero-knowledge arguments. One of the aspects that makes hash proof systems so interesting and powerful is that they can be[…] -
-
-
Seminar
-
Cryptography
On Error Correction for Physical Unclonable Functions
Speaker : Sven Muelich - Institute of Communications Engineering, Ulm University
Cryptographic applications require random, unique and unpredictable keys. Since most cryptosystems need to access the key several times, it usually has to be stored permanently. This is a potential vulnerability regarding security, even if a protected memory is used as key storage. Implementing secure key generation and storage is therefore an important and challenging task which can be[…] -