Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
667 résultats
-
-
Séminaire
-
Cryptographie
Functional Encryption: A novel paradigm for public-key encryption.
Orateur : Angelo De Caro - ENS
Whereas, in traditional public-key encryption, decryption is an all-or-nothing affair (i.e., a receiver is either able to recover the entire message using its key, or nothing), functional encryption enables fine-grained access control and computation on encrypted data, as required to protect data in the cloud.<br/> In the first part of the talk, we provide an introduction to functional encryption[…] -
-
-
Séminaire
-
Cryptographie
Cyclic and quasi-cyclic separable Goppa codes
Orateur : Sergey Bezzateev - Université d'État de Saint-Pétersbourg
Overview of recent results in constructions of cyclic and quasi-cyclic Goppa codes. Classical and generalized Goppa codes are considered. Subclasses of embedded optimal quasi-cyclic Goppa codes with improvement parameters are presented. -
-
-
Séminaire
-
Cryptographie
Same-Values Analysis on Elliptic Curve Cryptography
Orateur : Cédric Murdica - Secure-IC
Elliptic Curve Cryptography (ECC) is believed to be unbreakable in the black box model, where the cryptanalyst has access to inputs and outputs only. However, it is not enough if the cryptosystem is embedded on a device that is physically accessible to potential attackers. In addition to inputs and outputs, the attacker can study the physical behaviour of the device such as the execution time or[…] -
-
-
Séminaire
-
Cryptographie
Disjunctions for Hash Proof Systems: New Constructions and Applications
Orateur : Fabrice Ben Hamouda - ENS
Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt'02) as a tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found many other applications, including password authenticated key exchange, oblivious transfer, and zero-knowledge arguments. One of the aspects that makes hash proof systems so interesting and powerful is that they can be[…] -
-
-
Séminaire
-
Cryptographie
On Error Correction for Physical Unclonable Functions
Orateur : Sven Muelich - Institute of Communications Engineering, Ulm University
Cryptographic applications require random, unique and unpredictable keys. Since most cryptosystems need to access the key several times, it usually has to be stored permanently. This is a potential vulnerability regarding security, even if a protected memory is used as key storage. Implementing secure key generation and storage is therefore an important and challenging task which can be[…] -
-
-
Séminaire
-
Cryptographie
Logarithmes discrets dans les corps finis. Application en caractéristique "moyenne".
Orateur : Antoine Joux - UVSQ
Cet exposé commencera par une introduction aux algorithmes génériques de calcul de logarithmes discrets. Ensuite, nous nous intéresserons aux algorithmes de calcul d'index dans le cas le plus simple : celui de la petite ou moyenne caractéristique. Après une présentation des algorithmes précédemment connus, nous montrerons comment une transformation simple de ces algorithmes permet un amélioration[…] -