Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

721 results

    • Seminar

    • Cryptography

    GGHLite: More Efficient Multilinear Maps from Ideal Lattices

    • December 05, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Adeline Langlois - ENS Lyon

    The GGH Graded Encoding Scheme (of Garg, Gentry and Halevi), based on ideal lattices, is the first plausible approximation to a cryptographic multilinear map. Unfortunately, using the security analysis the authors provided, the scheme requires very large parameters to provide security for its underlying encoding re-randomization process. Our main contributions are to formalize, simplify and[…]
    • Seminar

    • Cryptography

    Learning with Errors in the Exponent

    • March 07, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : özgür Dagdelen - Darmstadt University

    We initiate the study of a novel class of group-theoretic intractability problems. Inspired by the theory of learning in presence of errors [Regev, STOC'05] we ask if noise in the exponent amplifies intractability. We put forth the notion of Learning with Errors in the Exponent (LWEE) and rather surprisingly show that various attractive properties known to ex- clusively hold for lattices carry[…]
    • Seminar

    • Cryptography

    Une solution du problème "Isomorphisme de polynômes à deux

    • September 26, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Jérôme Plût - ANSSI

    Le problème d'isomorphisme de polynômes à deux secrets (IP2S) pour m=2 variables sur un corps k est le suivant: étant données deux familles a, b de deux polynômes quadratiques chacune, trouver deux applications linéaires bijectives s, t telles que b = t ° a ° s. Nous donnons un algorithme permettant de calculer s, t en un temps O(n^4) pour toutes les instances.<br/> Le problème IP2S a été[…]
    • Seminar

    • Cryptography

    Attaques quantiques contre les chiffrements par bloc composés

    • March 13, 2015

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Marc Kaplan - Télécom ParisTech

    Nous étudions l'amplification de la sécurité obtenue en composant des chiffrements par bloc indépendants. Dans le cas classique, l'attaque Meet-in-the-middle est une attaque générique contre ces constructions. Si le temps nécessaire pour briser un chiffrement par bloc est t, alors cette attaque permet de briser deux chiffrements par bloc en un temps seulement 2t, alors qu'un cryptographe naïf[…]
    • Seminar

    • Cryptography

    Beyond the black and grey box

    • April 25, 2014

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Yoni De Mulder - University of Leuven

    In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted open platform, the adversary has full access to the implementation and its execution environment. As a result, the adversary is much more powerful than in a traditional black-box environment in which the adversary has only access to the inputs and outputs of a[…]
    • Seminar

    • Cryptography

    L1 a new quasi-linear LLL algorithm

    • May 13, 2011

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Andy Novocin - ENS Lyon

    The LLL lattice reduction algorithm of 1982 has proven to be useful in a wide variety of fields. It can be used to approximately solve computationally difficult lattice-based problems, such as the shortest vector problem, in polynomial time. We present a new algorithm for lattice reduction which is the first algorithm to have a complexity bound which is both polynomial and quasi-linear bound in[…]