527 résultats
-
Decoding Supercodes of Gabidulin Codes and Applications to Cryptanalysis
Orateur : Maxime Bombar - Ecole Polytechnique
Error correcting codes are well known to provide possible candidates for building quantum safe cryptographic primitives. Besides the Hamming metric which has a long-standing history, one may consider other metrics such as the rank metric. Gabidulin codes are the rank metric analogue of Reed-Solomon codes and can be efficiently decoded up to half the minimum distance. However, beyond this radius,[…] -
https://seminaire-c2.inria.fr/
Orateur : Séminaire C2 - Paris
-
On the hardness of the NTRU problem
Orateur : Alice Pellet-Mary - CNRS, Institut Mathématiques de Bordeaux
The NTRU problem is an algorithmic problem over structured lattices that was introduced by Hoffstein, Pipher, and Silverman more than 20 years ago, and which has been used to construct various cryptographic primitives. However, its relation to other lattice problems is still not well understood.<br/> In this talk, we will describe different variants of the NTRU problem, and study how they compare[…] -
Key recovery from partial information
Orateur : Gabrielle De Michelli - UC San Diego
The security of deployed protocols not only relies on the hardness of the underlying mathematical problem but also on the implementation of the algorithms involved. Many fast modular exponentiation algorithms have piled up over the years and some implementations have brought vulnerabilities that are exploitable by side-channel attacks, in particular cache attacks.<br/> In this talk, we consider[…] -
co-organisée avec le séminaire sécurité des systèmes électroniques embarqués
Orateur : mot de passe: 344005 - très classe le mot de passe en clair !
https://seminaires-dga.inria.fr/securite-elec/<br/> lien: https://bbb.irisa.fr/b/ger-mvp-9xd -
Lattice-based NIST candidates: abstractions and ninja tricks
Orateur : Thomas Prest - PQShield
I will present the remaining lattice-based candidates for standardization by NIST (2 signature schemes, 5 encryption schemes). At a high level, these can all be interpreted as straightforward instantiations of decades-old paradigms. But when we look under the hood, all of them make design choices which impact their security, efficiency and portability in distinct manners; we will discuss these.[…]