Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
627 results
-
-
Seminar
-
Cryptography
Protecting security protocols against guessing attacks: towards
Speaker : Mathieu Baudet - ENS Cachan
Designing secure protocols based on passwords is a difficult task. Indeed, passwords, and more generally low-entropy secrets, are potentially vulnerable to guessing attacks, that is, exhaustive, "brute force" searches. Preventing guessing attacks typically requires a protocol to conceal any partial information on the password (e.g. its checksum) which could help the attacker confirm his guess[…] -
-
-
Seminar
-
Cryptography
Theta identities and Thomae formulas
Speaker : Yaacov Kopeliovich
In this talk we apply Thomae formulas to obtain algebraic relations satisfied by Riemann surfaces that are cyclic covers of the Sphere. We focus on the genus 2 case and then give an example of a higher genus case (g=4) that was not known before. The conjectural connection of these identities as well as Thomae formulas to the moduli action of the Braid group is explained.<br/> We present a[…] -
-
-
Seminar
-
Cryptography
Group Signatures for Federated Systems
Speaker : Mark Manulis - Ruhr-University of Bochum
For many mutli-party applications group signatures are important cryptographic primitives that can be used for the purpose of anonymity and privacy. In classical group signatures members of a group are able to sign messages anonymously on behalf of the group. However, there exists a designated authority, called group manager, that initializes the scheme, adds new group members, and is able to open[…] -
-
-
Seminar
-
Cryptography
Efficient Multi-Party Computation with Dispute Control
Speaker : Zuzana Beerliova - ETH Zurich
Secure multi-party computation (MPC) allows a set of $n$ players to securely compute an agreed function of their inputs, even when up to $t$ of the players are under complete adversarial control. We consider secure MPC in the information-theoretic model with broadcast channels (PKI setup) and present an efficient protocol with optimal resilience ($t< n/2$), using a new technique technique called[…] -
-
-
Seminar
-
Cryptography
Signatures à vérification contrôlée
Speaker : Fabien Laguillaumie - LIX
Les signatures indéniables ont été introduites par Chaum et van Antwerpen en 1989 pour permettre au signataire de contrôler la vérification d'un signature qu'il a émise. En effet, la propriété de vérification universelle satisfaite par les signatures numériques classiques n'est pas souhaitable dans certaines applications électroniques (licence de logiciel, vote électronique,...). Ainsi, pour[…] -
-
-
Seminar
-
Cryptography
Une nouvelle demonstration du théorème de Teichmüller
Speaker : Walter Freyn - Augsburg University
Le théorème de Teichmüller donne la classification des surfaces de Riemann d'un certain type topologique préscrit.<br/> Sur toute surface de Riemann, dont le recouvrement universel est H, les structures complexes poeuvent etre identifiés avec des structures hyperboliques. Dans l'expose sera décrit une nouvelle démonstration du théorème de Teichmüller très élémentaire : on montre, que toute surface[…] -