Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
665 résultats
-
-
Séminaire
-
Cryptographie
Protecting security protocols against guessing attacks: towards
Orateur : Mathieu Baudet - ENS Cachan
Designing secure protocols based on passwords is a difficult task. Indeed, passwords, and more generally low-entropy secrets, are potentially vulnerable to guessing attacks, that is, exhaustive, "brute force" searches. Preventing guessing attacks typically requires a protocol to conceal any partial information on the password (e.g. its checksum) which could help the attacker confirm his guess[…] -
-
-
Séminaire
-
Cryptographie
Theta identities and Thomae formulas
Orateur : Yaacov Kopeliovich
In this talk we apply Thomae formulas to obtain algebraic relations satisfied by Riemann surfaces that are cyclic covers of the Sphere. We focus on the genus 2 case and then give an example of a higher genus case (g=4) that was not known before. The conjectural connection of these identities as well as Thomae formulas to the moduli action of the Braid group is explained.<br/> We present a[…] -
-
-
Séminaire
-
Cryptographie
Group Signatures for Federated Systems
Orateur : Mark Manulis - Ruhr-University of Bochum
For many mutli-party applications group signatures are important cryptographic primitives that can be used for the purpose of anonymity and privacy. In classical group signatures members of a group are able to sign messages anonymously on behalf of the group. However, there exists a designated authority, called group manager, that initializes the scheme, adds new group members, and is able to open[…] -
-
-
Séminaire
-
Cryptographie
Efficient Multi-Party Computation with Dispute Control
Orateur : Zuzana Beerliova - ETH Zurich
Secure multi-party computation (MPC) allows a set of $n$ players to securely compute an agreed function of their inputs, even when up to $t$ of the players are under complete adversarial control. We consider secure MPC in the information-theoretic model with broadcast channels (PKI setup) and present an efficient protocol with optimal resilience ($t< n/2$), using a new technique technique called[…] -
-
-
Séminaire
-
Cryptographie
Signatures à vérification contrôlée
Orateur : Fabien Laguillaumie - LIX
Les signatures indéniables ont été introduites par Chaum et van Antwerpen en 1989 pour permettre au signataire de contrôler la vérification d'un signature qu'il a émise. En effet, la propriété de vérification universelle satisfaite par les signatures numériques classiques n'est pas souhaitable dans certaines applications électroniques (licence de logiciel, vote électronique,...). Ainsi, pour[…] -
-
-
Séminaire
-
Cryptographie
Une nouvelle demonstration du théorème de Teichmüller
Orateur : Walter Freyn - Augsburg University
Le théorème de Teichmüller donne la classification des surfaces de Riemann d'un certain type topologique préscrit.<br/> Sur toute surface de Riemann, dont le recouvrement universel est H, les structures complexes poeuvent etre identifiés avec des structures hyperboliques. Dans l'expose sera décrit une nouvelle démonstration du théorème de Teichmüller très élémentaire : on montre, que toute surface[…] -