Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
627 results
- 
                    
    
          
                
                      
  
    
    
    - 
                                        
    
    
    Seminar 
- 
                                        
    
    Cryptography 
 Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream CiphersSpeaker : Orr Dunkelman - ENS-chaire France Telecom Time-Memory Tradeoff (TMTO) attacks on stream ciphers are a serious security threat and the resistance to this class of attacks is an important criterion in the design of a modern stream cipher. TMTO attacks are especially effective against stream ciphers where a variant of the TMTO attack can make use of multiple data to reduce the off-line and the on-line time complexities of the attack (given a[…]
- 
                                        
    
    
    
- 
                    
    
          
                
                      
  
    
    
    - 
                                        
    
    
    Seminar 
- 
                                        
    
    Cryptography 
 Vers une variante rigoureuse de l'algorithme de Coppersmith enSpeaker : Aurélie Bauer - Université de Versailles En 1996, Coppersmith introduit deux techniques basées sur la réduction de réseaux permettant de retrouver de petites racines d'équations polynomiales. Une de ces techiques s'applique au cas d'équations modulaires en une variable, l'autre concerne les équations entières à deux variables. Depuis, ces méthodes ont été utilisées dans de nombreuses applications cryptographiques. Pour certaines de ces[…]
- 
                                        
    
    
    
- 
                    
    
          
                
                      
  
    
    
    - 
                                        
    
    
    Seminar 
- 
                                        
    
    Cryptography 
 Cryptographie par sac à dos et instances NP-difficilesSpeaker : Laurent Evain - Université d'Angers On construit trois systèmes de cryptographie basés sur le problème NP-complet du sac à dos. Les constructions standard cachent des instances faciles du problème du sac à dos et ont été cassées. Les systèmes présentés ici sont plus surs car ils cachent des instances quelconques ( éventuellement difficiles ). On donnera des résultats de complexité ( taille de la clé, temps d'encodage et de décodage[…]
- 
                                        
    
    
    
- 
                    
    
          
                
                      
  
    
    
    - 
                                        
    
    
    Seminar 
- 
                                        
    
    Cryptography 
 Stream Ciphers - Now and ThenSpeaker : Emilia Kasper - Katholieke Universiteit Leuven In November 2004, the European Network of Excellence for Cryptology (ECRYPT) launched a call for new stream cipher primitives. Authors from academia as well as industry submitted 34 designs, and in May 2008, 8 ciphers were chosen for the eSTREAM final portfolio. In this talk, we look back at the history of stream ciphers to understand the design choices made by cryptographers today. We start by[…]
- 
                                        
    
    
    
- 
                    
    
          
                
                      
  
    
    
    - 
                                        
    
    
    Seminar 
- 
                                        
    
    Cryptography 
 Security Algorithms for Highly Constrained Devices such as RFIDSpeaker : Adi Shamir - Weizmann Institute of Science RFID tags are tiny computational devices with no internal source of power, which are likely to be deployed in a large number of applications in the next few years. In this talk I will describe several light weight security algorithms which were designed specifically for such devices, and in particular a new hash function called SQUASH which is provably at least as one-way as the Rabin scheme. It[…]
- 
                                        
    
    
    
- 
                    
    
          
                
                      
  
    
    
    - 
                                        
    
    
    Seminar 
- 
                                        
    
    Cryptography 
 Pairings on elliptic curvesSpeaker : Frederik Vercauteren - Katholieke Universiteit Leuven In the past 5 years there has been an explosion of applications of pairings. In this talk we will describe a recent construction of a variant of the Tate pairing which results in a significant speed-up. Furthermore, we will elaborate on the status of pairing inversion and its implications on pairing based cryptography, but also finite field cryptography.
-