Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
687 résultats
-
-
Séminaire
-
Cryptographie
Quantum Linear Key-recovery Attacks Using the QFT
Orateur : André Schrottenloher - IRISA
The Quantum Fourier Transform is a fundamental tool in quantum cryptanalysis, not only as the building block of Shor's algorithm, but also in attacks against symmetric cryptosystems. Indeed, hidden shift algorithms such as Simon's (FOCS 1994), which rely on the QFT, have been used to obtain attacks on some very specific block cipher structures. The Fourier Transform is also used in classical[…] -
-
-
Séminaire
-
Cryptographie
Side channel analysis against AEAD lightweight cryptography
Orateur : Modou SARRY - IMT Atlantique
Les dispositifs interconnectés tels que les réseaux de capteurs, la santé, les systèmes de contrôle distribués, l’internet des objets et les systèmes cyber-physiques sont de plus en plus répandus. Cette transition vers de petits appareils engendre de nouvelles préoccupations en matière de sécurité et de vie privée, car de nombreux algorithmes cryptographiques classiques ne répondent pas toujours[…] -
-
-
Séminaire
-
Cryptographie
TBD (To be decided closer to the date of the talk)
Orateur : Lisa Kohl - CWI
TBD (To be decided closer to the date of the talk) -
-
-
Séminaire
-
Cryptographie
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
Orateur : Léo Robert - Université d'Amiens
Post-Compromise Security (PCS) is a property of secure-channel establishment schemes, which limits the security breach of an adversary that has compromised one of the endpoint to a certain number of messages, after which the channel heals. An attractive property, especially in view of Snowden's revelation of mass-surveillance, PCS features in prominent messaging protocols such as Signal. In this[…] -
-
-
Séminaire
-
Cryptographie
Shorter Lattice-Based Fiat-Shamir Signatures
Orateur : Julien Devevey - ANSSI
We present HAETAE (Hyperball bimodAl modulE rejecTion signAture schemE), a new lattice-based signature scheme, which we submitted to the Korean Post-Quantum Cryptography Competition for standardization. Like the NIST-selected Dilithium signature scheme, HAETAE is based on the Fiat-Shamir with Aborts paradigm, but our design choices target an improved complexity/compactness compromise that is[…] -
-
-
Séminaire
-
Cryptographie
Ind-cpa-d insecurity of approximate and exact homomorphic encryption schemes
Orateur : Elias Suvanto - Cryptolab
Fully Homomorphic Encryption enables the evaluation of arbitrary circuits over encrypted data while maintaining the confidentiality of the underlying messages. It greatly enhances functionality but also comes with security challenges for some applications like Threshold FHE. While the standard IND-CPA security is sufficient against honest but curious adversaries, a stronger security notion called[…] -