Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

657 results

    • Seminar

    • Cryptography

    La sécurité des schémas de Feistel aléatoires

    • October 14, 2005

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Jacques Patarin - Université de Versaille

    Les schémas de Feistel fournissent une méthode standard pour construire des permutations pseudo-aléatoires, ou encore pour construire des algorithmes de chiffrement par blocs. Depuis le célèbre résultat de Luby et Rackoff sur les schémas de Feistel aléatoires à 3 et 4 tours (1989) les preuves de sécurité et les attaques sur ces schémas ont été améliorées à plusieurs reprise.<br/> Dans cet exposé[…]
    • Seminar

    • Cryptography

    Constructing group based provably secure encryption schemes: a

    • April 28, 2006

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Maria Isabel Gonzalez Vasco - Universidad Rey Juan Carlos Madrid

    Cryptographic primitives arising from group theory have in the last few years attracted a lot of attention. Unfortunately, up to date most of the existing proposals are still far away from practical applications, not only due to unlucky computational assumptions which later turned out to be invalid. In this talk we address the impact of modern security analysis in the sense of provable security to[…]
    • Seminar

    • Cryptography

    Relative rigid cohomology and the deformation method for elliptic curves

    • November 18, 2005

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Ralf Gerkmann - Universitat Mainz

    By a well-known result of Dwork the zeta functions of the fibers in a one-parameter family of hypersurfaces can be described in terms of p-adic holomorphic functions. This result was used by A. Lauder in order to formulate a deter- ministic algorithm that computes the zeta function of a hypersurface in polynomial time. In this talk we describe a similiar method for elliptic curves which is based[…]
    • Seminar

    • Cryptography

    Algebraic attacks and design of block ciphers, stream ciphers, and multivariate public key schemes

    • March 19, 2004

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Nicolas Courtois - Schlumberger

    Following the famous 1949 paper of Shannon, breaking a "good" cipher should require: "as much work as solving a system of simultaneous equations in a large number of unknowns of a complex type". For most practical cryptosystems, the problem of recovering the key can indeed can be seen as solving a huge system of binary nonlinear equations. In general, solving such a problem is known to be NP-hard,[…]
    • Seminar

    • Cryptography

    Quantum complexity of the knapsack problem

    • November 19, 2004

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Alexandre Kazakov

    An analogue quantum computer for the solution of the knapsack problem is discussed. Dynamics of some quantum-optical system exhibits explicit parallels with knapsack problem. This fact gives the possibility to propose an quantum algorithm for the knapsack problem and to estimate the quantum complexity of this problem.
    • Seminar

    • Cryptography

    Propriétés cryptographiques des fonctions booléennes symétriques

    • May 27, 2005

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Marion Videau - INRIA Rocquencourt

    Les fonctions booléennes symétriques sont les fonctions dont la valeur ne dépend que du poids du vecteur d'entrée. Ces fonctions peuvent être représentées plus simplement, que ce soit par leur forme algébrique normale ou leur vecteur des valeurs, que des fonctions booléennes générales --- vecteurs de taille (n+1) contre des vecteurs de taille 2^{n} en général. En outre, ces fonctions ont une[…]