640 résultats
-
Middle-Product Learning with Rounding Problem and its Applications
Orateur : Katharina Boudgoust - Univ Rennes, CNRS, IRISA
This talk focuses on a new variant of the Learning With Errors (LWE) problem, a fundamental computational problem used in lattice-based cryptography.<br/> At Crypto17, Roşca et al. introduced the Middle-Product LWE problem (MP-LWE), whose hardness is based on the hardness of the Polynomial LWE (P-LWE) problem parameterized by a large set of polynomials, making it more secure against the possible[…] -
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
Orateur : Emmanuel Thomé - INRIA Nancy
We report on two new records: the factorization of RSA-240, a 795-bit number, and a discrete logarithm computation over a 795-bit prime field. Previous records were the factorization of RSA-768 in 2009 and a 768-bit discrete logarithm computation in 2016. Our two computations at the 795-bit level were done using the same hardware and software, and show that computing a discrete logarithm is not[…] -
The generalized quaternion isogeny path problem.
Orateur : Antonin Leroux - LIX
The correspondence between maximal orders in a quaternion algebra and supersingular elliptic curves has uncovered new perspectives in the field of isogeny-based cryptography. The KLPT algorithm of Kohel et al. in 2014 introduces an algorithm solving the quaternion isogeny path problem in polynomial time. Studying this problem has applications both constructive and destructive. It has allowed to[…] -
Cryptographie post-quantique fondée sur les codes : les candidats à la standardisation
Orateur : Nicolas Sendrier - INRIA
Au second tour du processus de standardisation du NIST, il reste 7 candidats dont la sécurité est fondée sur les code correcteurs, tous sont des mécanismes d'échange de clé. Nous les classifierons selon leurs hypothèses de sécurité et leurs propriétés. Nous trouvons les systèmes « historiques » (Classic McEliece et NTS-KEM), les systèmes fondés sur des matrices creuses et quasi-cycliques (BIKE,[…] -
Candidats NIST basés sur les réseaux: choix de conception et astuces de ninja
Orateur : Thomas Prest. - PQShield
Parmi les 26 schémas post-quantique toujours considérés pour standardisation par le NIST, 12 sont basés sur les réseaux (3 schémas de signature et 9 schémas de chiffrement). Cette présentation leur est consacrée. A haut niveau, tous peuvent être interprétés comme des instanciations directes de paradigmes bien établis. Mais une analyse plus attentive révèle que chacun d'eux fait des choix de[…] -
Implicit proofs of membership
Orateur : Olivier Blazy - Université Limoges
Smooth hash proof systems have been introduced by Cramer and shoup to build compact efficient cca2 encryption in the standard model. Since then, they found applications in a broad range of protocols from oblivious transfer to authenticated key exchange, passing by witness examples.<br/> In this talk, we will start by a panorama of languages that can be managed by such a primitive and then show how[…]