526 résultats
-
MinRank Gabidulin encryption scheme on matrix codes
Orateur : Adrien Vinçotte - XLIM, Université de Limoges
The McEliece scheme is a generic framework allowing to use any error correcting code which disposes of an efficient decoding algorithm to design an encryption scheme by hiding a generator matrix of this code.In the context of rank metric, we propose a generalization of the McEliece frame to matrix codes. From a vector code, we compute a matrix version of this code, that is hidden in such a way[…]-
Cryptography
-
Asymmetric primitive
-
-
Adapting Identity-based Encryption with Wildcards to Access Control
Orateur : Anaïs Barthoulot - Université de Montpellier
Nowadays, connected objects play an important role in our daily lives, providing services related to our cities, cars, homes, and health. For this purpose, they often need to be accessible by external entities, such as a garage owner (for a connected car), a postman (for a connected home), or a doctor (for a connected health device). However, it is crucial for the owner of such objects to retain[…] -
Soutenance de thèse : Les attaques physiques sur les chiffrements intègres légers
Orateur : Modou Sarry - IMT Atlantique
Les dispositifs interconnectés tels que les réseaux de capteurs, la santé, les systèmes de contrôle distribués, l’internet des objets et les systèmes cyber-physiques sont de plus en plus répandus. Cette transition vers de petits appareils engendre de nouvelles préoccupations en matière de sécurité et de vie privée, car de nombreux algorithmes cryptographiques classiques ne répondent pas toujours[…] -
Elliptic curves for SNARK and proof systems
Orateur : Aurore Guillevic - INRIA Rennes
This talk is based on joint works with Diego Aranha, Youssef El Housni, and Simon Masson. Elliptic curves make possible in practice very interesting mechanisms of proofs. The security relies on the difficulty of the discrete log problem and variants. Succinct non-interactive arguments of knowledge (SNARK) are a very fruitful topic, so that given a sequence of instructions that can be quite large,[…] -
Soutenances de stages de M2
Orateur : Gael Claudel et Baptiste Germon - IRISA
-
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
Orateur : Denis Nabokov - Université de Lund
Whereas theoretical attacks on standardized crypto primitives rarely lead to actual practical attacks, the situation is different for side-channel attacks. Improvements in the performance of side-channel attacks are of utmost importance. In this paper, we propose a framework to be used in key-recovery side-channel attacks on CCA-secure post-quantum encryption schemes. The basic idea is to[…]